Analysis

  • max time kernel
    138s
  • max time network
    156s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    23/02/2025, 14:19

General

  • Target

    Start10ThemeEdit.exe

  • Size

    660.7MB

  • MD5

    c12dfa79c1d3ca0a3c3ed007a4f25564

  • SHA1

    5fc6404fb8d78be78d76272b3c3c869f90198792

  • SHA256

    94e8892bd96427806b523b9fe551bc639297aeb58267c58c4cb7980b36a517a5

  • SHA512

    5fe1dda86201129915b0569e2793a7f17c4fbe7d0fc881f7a0e4390608ec6dd4369addb243ebc5c29011e1df72218f79cbd42aa53f896fb0958e572f4494d345

  • SSDEEP

    393216:fkcbf0j8aPknFM7mqF6WEuDLEXgqqIv1MCNrrPgLX3wRHyN6:scj0PPknFymqXE8gXKkJrPgL6SE

Malware Config

Signatures

  • Detect Vidar Stealer 33 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Downloads MZ/PE file 1 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 53 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe
    "C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\is-0T904.tmp\Start10ThemeEdit.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-0T904.tmp\Start10ThemeEdit.tmp" /SL5="$50230,15291586,119296,C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe
        "C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe" /VERYSILENT
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Users\Admin\AppData\Local\Temp\is-MQM9A.tmp\Start10ThemeEdit.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-MQM9A.tmp\Start10ThemeEdit.tmp" /SL5="$50240,15291586,119296,C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe
            "C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe" allodial.a3x
            5⤵
            • Downloads MZ/PE file
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4692
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
              6⤵
              • Uses browser remote debugging
              • Drops file in Windows directory
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:3200
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffafb32cc40,0x7ffafb32cc4c,0x7ffafb32cc58
                7⤵
                  PID:4452
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1868 /prefetch:2
                  7⤵
                    PID:3316
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:3
                    7⤵
                      PID:2588
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:8
                      7⤵
                        PID:3032
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:1
                        7⤵
                        • Uses browser remote debugging
                        PID:656
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3256 /prefetch:1
                        7⤵
                        • Uses browser remote debugging
                        PID:2648
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4292,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4300 /prefetch:1
                        7⤵
                        • Uses browser remote debugging
                        PID:2984
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:8
                        7⤵
                          PID:540
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:8
                          7⤵
                            PID:4532
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4848,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:8
                            7⤵
                              PID:2060
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:8
                              7⤵
                                PID:3560
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              6⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:1540
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffafb7d46f8,0x7ffafb7d4708,0x7ffafb7d4718
                                7⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4556
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                                7⤵
                                  PID:1272
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
                                  7⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4776
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:8
                                  7⤵
                                    PID:5068
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:1
                                    7⤵
                                    • Uses browser remote debugging
                                    PID:4964
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                                    7⤵
                                    • Uses browser remote debugging
                                    PID:4488
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:1
                                    7⤵
                                    • Uses browser remote debugging
                                    PID:2264
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:1
                                    7⤵
                                    • Uses browser remote debugging
                                    PID:3236
                                • C:\ProgramData\dj5xlfcjm7.exe
                                  "C:\ProgramData\dj5xlfcjm7.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:3276
                                  • C:\Users\Admin\AppData\Local\Temp\is-J5KEI.tmp\dj5xlfcjm7.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-J5KEI.tmp\dj5xlfcjm7.tmp" /SL5="$B0238,13414214,119296,C:\ProgramData\dj5xlfcjm7.exe"
                                    7⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:2684
                                    • C:\ProgramData\dj5xlfcjm7.exe
                                      "C:\ProgramData\dj5xlfcjm7.exe" /VERYSILENT
                                      8⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      PID:4040
                                      • C:\Users\Admin\AppData\Local\Temp\is-9AC91.tmp\dj5xlfcjm7.tmp
                                        "C:\Users\Admin\AppData\Local\Temp\is-9AC91.tmp\dj5xlfcjm7.tmp" /SL5="$10006A,13414214,119296,C:\ProgramData\dj5xlfcjm7.exe" /VERYSILENT
                                        9⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of FindShellTrayWindow
                                        PID:3060
                                        • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\AutoIt3.exe
                                          "C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\AutoIt3.exe" celloidin.a3x
                                          10⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2060
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                            11⤵
                                              PID:1832
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe" & rd /s /q "C:\ProgramData\1no8g" & exit
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4036
                                    • C:\Windows\SysWOW64\timeout.exe
                                      timeout /t 10
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      • Delays execution with timeout.exe
                                      PID:2680
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:3800
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                            1⤵
                              PID:2360

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\dj5xlfcjm7.exe

                              Filesize

                              14.0MB

                              MD5

                              31c1980129a020ffd2836386ec757229

                              SHA1

                              01da59330c87adcc026aec2ff17695917ca61475

                              SHA256

                              b0094fc915f2cca6534fa7edc48ae1e400687e4aea032b9a6f0e626331b573cd

                              SHA512

                              cc876005cf9ba5878069a542c89507cded8159402c6a4402bb10ca7ee3f9a6c613c1ba101836e8463ebf36249ebef923132d7bc8ad490d2e36c80d234861c7b7

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              9091da214c5c97c04dfbd4afc733ec2f

                              SHA1

                              680c48d5c7cdf8b85d12d76e5b5af7d9ccf452b7

                              SHA256

                              565c816ea4b9387afdda41c0fc27e21ff9ae434cdca28af87483a29408d85f68

                              SHA512

                              5a561d5ebba54af22f33471f622ece68d4d9ba7e7a4f5b6848122aeb9ce07e51e9a56c1357165a5a7daabd03ecd8244b5759b893660958fe5d9264f7cbca0bee

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              bd023af53a4cc087d05a6b76279bfcc5

                              SHA1

                              c304433ca0d5b9a7742f0d2de467ff0e4e02ff64

                              SHA256

                              01aec64eaa384e936b5dc9562ef43098992311c76327fa3de37e048d52c254e8

                              SHA512

                              0e56bdc721b25424c3ff7a44405cafd3c48721cfc4611295b35210c84ed18a3d32d6176094b6a7529e104b9be04118554f6785e0cbd5315b147d3857bd4a32de

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Web Data

                              Filesize

                              112KB

                              MD5

                              e03fc0ff83fdfa203efc0eb3d2b8ed35

                              SHA1

                              c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664

                              SHA256

                              08d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe

                              SHA512

                              c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2

                            • C:\Users\Admin\AppData\Local\Temp\is-0T904.tmp\Start10ThemeEdit.tmp

                              Filesize

                              1.1MB

                              MD5

                              b1f9d665e52c29972b50d7145d88dce1

                              SHA1

                              df2c67a5c32a19bb110ec8372134522c0dab9ac2

                              SHA256

                              2ffabb0018d335267d2d0101a41cac7ac7d1aa80956fae91825e46aaa85c0787

                              SHA512

                              bcdce189402ffc1c17b9803ac4040bd1cb23e32ba2c1476cbcfae13438078e01f78ad3f76e1bf71a6ec204663aa5f5780990016fc074218763d63db1431f1e75

                            • C:\Users\Admin\AppData\Local\Temp\is-QAB20.tmp\_isetup\_shfoldr.dll

                              Filesize

                              22KB

                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • C:\Users\Admin\AppData\Local\Temp\is-V18KI.tmp\_isetup\_iscrypt.dll

                              Filesize

                              2KB

                              MD5

                              a69559718ab506675e907fe49deb71e9

                              SHA1

                              bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                              SHA256

                              2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                              SHA512

                              e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                            • C:\Users\Admin\AppData\Local\Temp\is-V18KI.tmp\_isetup\_isdecmp.dll

                              Filesize

                              13KB

                              MD5

                              a813d18268affd4763dde940246dc7e5

                              SHA1

                              c7366e1fd925c17cc6068001bd38eaef5b42852f

                              SHA256

                              e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64

                              SHA512

                              b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\7za.dll

                              Filesize

                              385KB

                              MD5

                              cb99bbdea56a7e08c8b475bcecd5df41

                              SHA1

                              5c9eb462054c8242b2a9f69b3e5d27c6a1daa0f6

                              SHA256

                              8ed926351e3c5acfffd5d3890b17d5d96990b7ccbdfc4e549df46ef963d52f88

                              SHA512

                              829e7b7e6cce4cf6b50438e451f4bbf3eabfe827c641fb2bef3808609267aa79dcdb987a569ee71b85a702953fa7861bb6b7e00f07efd18829391f32574dc4d9

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\ACEEXCL.DLL

                              Filesize

                              877KB

                              MD5

                              84784ef516d810edd01e7ec2775246e1

                              SHA1

                              7b6a9b90031270bd4868af5ab5e7175ab30d5efa

                              SHA256

                              65077d9942193aa89e119b86ed6e26cbed159acb13faaae6e6503aea0564e780

                              SHA512

                              4906c8f0633d948c7157ed71b58b83f5469259ce8b89ed7c5c2d3f0945781e73a8474901a0246e04d0da1ef9a861f1523d1f3c87f5924bdeef0363581e3e2b48

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\AutoIt3.exe

                              Filesize

                              921KB

                              MD5

                              3f58a517f1f4796225137e7659ad2adb

                              SHA1

                              e264ba0e9987b0ad0812e5dd4dd3075531cfe269

                              SHA256

                              1da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48

                              SHA512

                              acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\CppDebug.resources.dll

                              Filesize

                              385KB

                              MD5

                              f31b31d462d008b2f319cf9fa5b3744e

                              SHA1

                              0b5e96edbf7a4afe7cd52b0ee7e0a29ba72b4939

                              SHA256

                              20508054642d0d5030760095b6210fa88ca10288764a77683ac2bcb9d0d4cd43

                              SHA512

                              400edbfd2c4b66fcf91076685f379858717a60eeb1836cda01a5b2bfb1501229b57a48673b916c8acfabaf212be3bf0ced096431b9a5130f391efb8be239648b

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\DiagnosticsHub.StandardCollector.Bridge.dll

                              Filesize

                              290KB

                              MD5

                              ae1ee814db6be02481a5bb7d031760c0

                              SHA1

                              996ee493ddda8114d2957a1f6d0299e8e2be6ab6

                              SHA256

                              eeae37ec39a65b44309c973703a31bbf85ff13aa0b38e1668ded3455c5b55b1d

                              SHA512

                              94cd63e65c628d25d600cf0d7cc49d6dda7bce79ac6f4319dca91c45713c2d3764f1410453ef27f779ebda2550f0493b7f9468ce60a27a6eff6676307f44d9bc

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\GpuProfilingAnalyzer.dll

                              Filesize

                              334KB

                              MD5

                              7804edfa6e74df21c23efa1fbb52116b

                              SHA1

                              51eea741f5e1bcda5ac96dd46e3a2e9ce9f5309b

                              SHA256

                              fa903f2ff8a566c7728c8f2ac42409607cb1ef1519b9f9d3591a4656f095f8df

                              SHA512

                              1b8a181da013ee74a3f49a7ad2104c5b3817e7d7d1dc2e155210c5965b8c6179e034d635e418a0861d5ba563542cb03835ab6877daa77b26eb9eb97ccdc43e4c

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\LdrtBurn64.dll

                              Filesize

                              226KB

                              MD5

                              4b815e44d94d38438b90c3198797c0a5

                              SHA1

                              d29d9ca4f66e13c66eeb3e53332670f777252597

                              SHA256

                              0c80df2fdc238ddc66b5ae493a9dea395f03b828fdde4d6d90ffd76154d6ea03

                              SHA512

                              8563c2b7d1c2ee48a9ae297d8ab9251ed18a896d1ff4b29b088f02393891bf28f888e7c6d5c7c6133069d18fe5bec37d936dce6ca83d5ca64b901296669fc74d

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Lib\is-QRDFT.tmp

                              Filesize

                              22KB

                              MD5

                              b7e5d9a2dc7e37d13dcfa24e7c81c0f8

                              SHA1

                              f87bdda9ff570ff3d53cdfa3393b7a2d826b8dda

                              SHA256

                              b51eb89d1dfb794095e98fbf1b87373006a1bc6dda6fcebfc86402804c32f7c6

                              SHA512

                              1a6af325524513b176d1a34c653b438a4f284f9079e9841ebaa27b025217027ec669189ea81b7d80b15e2de18b628f255822ae105ff40b7355dc9c071be9384c

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.Azure.Management.Monitor.Fluent.dll

                              Filesize

                              763KB

                              MD5

                              1e2cbea517a43333ff2a9543b87784fc

                              SHA1

                              38a3b0eafc3ba9a14e980a370a9035dacb6729b8

                              SHA256

                              eba1024441cd2801652b02e9bf60813cff30b7fac68e31f055e056ac75135d6e

                              SHA512

                              151a10fa1e52c1aae768afc1da936c03de50025cd6b65d4dbd43c3d586f3921fc23bc96d08b06ecd185f432f89b254c6810701138b286e98885b785d728fc206

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.CodeAnalysis.VisualBasic.CodeStyle.Fixes.dll

                              Filesize

                              216KB

                              MD5

                              ebe72cf87ea6cdc8f2ad4ffb9dcec178

                              SHA1

                              4c721340878eb8c33622eccf47eb449c46b55f48

                              SHA256

                              fb63d2ea793babc1b30f4cf35d323ec17e493b60c138814ca8193d6ba0b188e3

                              SHA512

                              60d2440c0cb5ee30a7c7b77782bb4b6977d45c732d6029cd7debf4f5a6d8330256a4d02c8a0c11f6e3f46b4f2a2ba09e7e439d2d98e0a33272a3304650a5b88a

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.Office.BusinessData.dll

                              Filesize

                              933KB

                              MD5

                              5f20cc1396134d409fb641cc6f78623c

                              SHA1

                              bd7643e4b22859524bc5efcb61df5e5c52daea6e

                              SHA256

                              c8b9ba1cd9cb779ab9553fde17ae145e3d90b283fb2fdd1c01cef7091970c514

                              SHA512

                              231a1b7c5ea47cedc35c0d09ac62a2d8057548091cf1ddf44b145791d687c40dfb707cac800c334cb655ab589e9119fd03339db65f5846ef83ce82d660c276e1

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualC.ProjectStore.Implementation.dll

                              Filesize

                              1.1MB

                              MD5

                              4ee2f7bf87f129f0cdc25962cd10db98

                              SHA1

                              cb180413d4c1b69e3b7a52b7e2ba519eb0e4fd23

                              SHA256

                              b8d584deef1e17a9e54e7059dde7e0f9be6189fd9fb4eb3bbc4d80195439cbeb

                              SHA512

                              6d4a5fa140d941b3f0759092c46eda432521c26a49895fdf2c6852480e005c476105398cc686a2cbf24e8c2f8fabefb43d79833369fa7850e3cae5c4d801e746

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualStudio.JavaScript.ProjectSystem.resources.dll

                              Filesize

                              425KB

                              MD5

                              4284df6b52b471072e4ac3bc5c91e9d6

                              SHA1

                              a41b9b1c6d5e3db10182929740b5b82ff8747e3e

                              SHA256

                              1e9cf8c5fdabbbffaa5cfe428cf356cab98afdc3466d7337b0bb0c595178de9f

                              SHA512

                              8e6f73ff43ed8ef80609196eed68c5eb7f0db13c9b8fd56caefdb6b6c4ad9e44f3b265296195c4b88c1333bc27bc5baad0ffff157614a45e30d3fd0c682aaed4

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualStudio.Shell.Framework.dll

                              Filesize

                              344KB

                              MD5

                              6e34dc8152c7ef22eeec636260e85d4f

                              SHA1

                              79c4b597eff147c377103ae1a57d900209cf50ba

                              SHA256

                              0d2d0ab2940589ee413cc67206bcbc358b2938f7d7375e6b268c7094f394b4c3

                              SHA512

                              9769239eec06433d25ecf37782dcd26265f1526dbce287274a46615e9fea5604f350cf54fb9d4569a8f5121e95ca1106fbddbea241c7265bc9a427b9f4a0a01c

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\MicrosoftInstrumentationEngine_x86.dll

                              Filesize

                              1.2MB

                              MD5

                              3c3f7793c563b205807e6a64f3d09c56

                              SHA1

                              c30fefcdc4a2f251b139154519bfcc649ed762c2

                              SHA256

                              164844e7e460fa93bb5a1ded8dfcd66644a017d426bfab5214389e2591000842

                              SHA512

                              6336e82def733f1169458ace00099b252829e84fbbdd21b2b07a4dc4718a42cf7af94953f8853b162c90d5861d589426be070c0e60d5f5b167d87adf4c3d11c3

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\aspnetcorev2_inprocess.dll

                              Filesize

                              371KB

                              MD5

                              0c64f7c44299d6c60dddd35f3b3a8dcb

                              SHA1

                              1342926985f9d2405949ddf1e64fb36efc3182c0

                              SHA256

                              6ca448432389259852d5f5a5a134ffc593d9e1b3c5d8b37afeeb22979cf6fc6c

                              SHA512

                              d4663983721eab36832a267ab49ab65839b44b8d51f5760654e31e07a73cf357938e546ae48a7913457a59a4885be54914d8e259755f859d9b979ad0beef0e1a

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\celloidin.a3x

                              Filesize

                              1.0MB

                              MD5

                              1d65c9c904886e50c31fbcb33105b29b

                              SHA1

                              ebd619c3f2b2d701c83e476b0f81d2ef8c6df628

                              SHA256

                              d7be17d190bb74e981c06fab244a0bd901dccd1dd872c524db48693e33d36bd6

                              SHA512

                              1aed6815249a459ff1f19cce68a636f8ff3d7bdff2a82bcf161abafa541db3bd9716339a6bdf88253a048a2d8bbf8ef37458fe64d2da78cfbb3e5d9f8f457916

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\celloidin.pptx

                              Filesize

                              5.0MB

                              MD5

                              d0a65c478eec14c640565ef4f7195aa7

                              SHA1

                              50d01a9425692f4d2240183e2f61ab1b25e72527

                              SHA256

                              857e48b908a5f6c3e511b6597479e072a238810e901c2530c9b856bfc36318de

                              SHA512

                              c79ec1f9cd077665a2328c03166dc86793495eb098f3bf2fc96adbbc198a3f98bee96daabf1207a620772681a6a0d4a7af341f45aea11ffd5970786ac92a1472

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\cpfecl.Clang.Windows.arm64.dll

                              Filesize

                              432KB

                              MD5

                              8cea62007f23ec06224ced33fc635494

                              SHA1

                              17839da287796e36b4d2de0e3cd82e9e8cdda997

                              SHA256

                              aac9b0827cebb37e9068e6087c9f1aa3bd5d94ee46d9cf63cae2e94784f61c32

                              SHA512

                              e721b048f05e2c238e29f2c638d59bcd1855f5a93b8c1c2fe7334d90cd08858bbfa8cc6f7e9537b4f7ee5a1baca60d0c664f8ea0cadda9f43883cb0af655a9f0

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\fputlsat.dll

                              Filesize

                              967KB

                              MD5

                              5f3c2683da9ee8ef7d6464cce1463f81

                              SHA1

                              19df76f2f2d6ba9fc099479e209e81f08b83c9c6

                              SHA256

                              a9e676cb483c6aa45485ddcb3f01dcec52cd12906b71d6c97ae7a3bde931fbe4

                              SHA512

                              e824f056ab022dbc08d55cf5860ac9989d9b6d786526988eb588ad91511193237132c846cbdddb3b0ecdc6e3ffea3a49ba1340d6321cec5b293432128a853648

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\graphics-hook64.dll

                              Filesize

                              1.1MB

                              MD5

                              2c48f538acb4f796ac57c9ee48b77b75

                              SHA1

                              f3dbdc1a09ebf384eca18489b89d3536cc85d7d5

                              SHA256

                              3f7a220d9d988fbbf161c8979950ab58895550d411bb8e4a9ca83ead125abf25

                              SHA512

                              903f2772225d36b700fc3ec9f4c0b1032b28da6500499bcfc0823d87056bbae3ad47806116fd63555546e29ebca352b0243730fc2dda6e12e877f782bc81bbf4

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\libhogweed-6.dll

                              Filesize

                              273KB

                              MD5

                              4dcb8ab70f71fabb672186f5acb1ebe3

                              SHA1

                              84f9890d70c3002b15adeec18ec52e1ba72cfee1

                              SHA256

                              acf669f5d665c1b42c8073069311de08a872d1b4121e0bf92eafb68e4424c057

                              SHA512

                              31f9d73115265c72ee6b90d2a8020b6d95715a0f21081147fc7aeb49c1bc7f030c00e2bb1a1800d5b3901212834d9dc818ff196b4245f0547e5351f1d5ea3a71

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\microsoft.visualstudio.graphics.dll

                              Filesize

                              664KB

                              MD5

                              3722b171bcaaa0dd245b45de546ea6a6

                              SHA1

                              12de412117c3aef922b0c91bc8a147079ab45b8b

                              SHA256

                              e30abd7d20980e6e5201a4ce5fb94f0492e0f31fc866627c7340c08b12ef2317

                              SHA512

                              0d76f5b729a1e780e5e196a1cb6f96aae1fa655b0cfacce22ee1701765c8e90d0614fd8ab5e2f2a2ed530e69670f894627cbf4bf3d0301bb5992cb088df54d83

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\mozwer.dll

                              Filesize

                              322KB

                              MD5

                              ed88025353ef136babc0b1030eddc0a4

                              SHA1

                              dd433e935562034d61dbd06eda9b8e2193085e79

                              SHA256

                              99bcbc6dd04b0add980a1b272e5ffa4cf0b017e65a65a3653e727be36594257e

                              SHA512

                              f9b210deab51e31036f3c03775df438f3f9152e8defd239a5d6d70b3b46fea8f3127410b174735656d5ca3f1c0c4e494764cffcf2b3422b79c40f0544b99d8ec

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\mp3lame.dll

                              Filesize

                              566KB

                              MD5

                              99128d32f7b0e4296d73fb424faf9106

                              SHA1

                              81dbeb05db64d5f0fc2abf62b7a763e0cff65fa6

                              SHA256

                              fcdadfb4aaf985df247cbbbe3761072e303832db9b1fcdd2379552c0d0fb8971

                              SHA512

                              0ddc593b4e006fcd3a0945037996373c9db6cb024c7da013b661241cd51b25fc370ca2560817488a0d3612e813ef198466f4a025dc02ce14f19fcf6ce72dc101

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\msenvico.dll

                              Filesize

                              683KB

                              MD5

                              c346dca20fb65853c5d5e0026390091a

                              SHA1

                              cc985c0edfd450a0c0b85f0521de46eb61b21adb

                              SHA256

                              c2a84abdf647e4a3f1671b33806f0283257627fe91c717bcd0eac14cced0b00d

                              SHA512

                              778cccab5f0ba187f77bec54ac1ca43b2930aba1a387e98b142671a30419b40400f1eadaa280a6bc899c50f64027db661a9e2bb43fee1006125b242cfcb4408a

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\msvcp100d.dll

                              Filesize

                              990KB

                              MD5

                              cdc9a614e6ecaa0e238b9e6c2ed5ae4d

                              SHA1

                              289914c1237fbbe3e985a4cb9db791d3b1479712

                              SHA256

                              8fef7e737753988494524014bf4e1d06a2f4487e6412d8cd1be0a08110ff0c83

                              SHA512

                              987ba4cb1da3c827bf83888371119f4946ae96d91d68144f23238615c03bd17795037218f8165809c02d33d6c3cac64e4ec8133a2607262e2b485b974fd821f8

                            • C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\sqlcese35.dll

                              Filesize

                              629KB

                              MD5

                              9329ea78784a291fff3df9ee815b76aa

                              SHA1

                              54d71341e7255d8e885e9b038f67d14a3b0d916d

                              SHA256

                              3c2a22cf3c712491afdd83afe5db6c0ec79eb2102bf6949389d784e084d84d96

                              SHA512

                              a57fb3af2424a6efb63caeaa5eaa3f07aeea67fb1ef26d2a867ceef70f815845bf360bd7bc142c4bf33278037b1a413d68fa688b39e03b2948576c1e4cf4ab58

                            • memory/2152-25-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/2152-23-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/2152-46-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/2152-125-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/2360-30-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/2360-6-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3276-277-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/3504-32-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/3504-2-0x0000000000401000-0x0000000000412000-memory.dmp

                              Filesize

                              68KB

                            • memory/3504-1-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/3980-33-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3980-49-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3980-113-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3980-122-0x0000000000400000-0x000000000052C000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/4040-297-0x0000000000400000-0x0000000000428000-memory.dmp

                              Filesize

                              160KB

                            • memory/4692-142-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-258-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-259-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-260-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-257-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-256-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-255-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-254-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-248-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-247-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-245-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-244-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-243-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-241-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-240-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-239-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-238-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-237-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-236-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-187-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-186-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-185-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-184-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-183-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-182-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-181-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-180-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-179-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-178-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-143-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-141-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-140-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-129-0x0000000003220000-0x0000000003242000-memory.dmp

                              Filesize

                              136KB

                            • memory/4692-128-0x00000000016E0000-0x00000000016E3000-memory.dmp

                              Filesize

                              12KB

                            • memory/4692-126-0x00000000011A0000-0x00000000011B9000-memory.dmp

                              Filesize

                              100KB