Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240730-en
  • resource tags

    arch:x64arch:x86image:win11-20240730-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-08-2024 03:32

General

  • Target

    3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe

  • Size

    1.8MB

  • MD5

    09e01863cce03edfae832f8919a5333f

  • SHA1

    d0b8e0d222dce89cc49a8bfab16485155a51fd55

  • SHA256

    3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232

  • SHA512

    2edb30a7b1969fb4122a11165ae6d696bcc79f277255cd25f492d2e5c40cda83be12b0f2d066a8027cbe7bfb14c80cf912c4898f3431e30610c4439cbc7a3566

  • SSDEEP

    49152:iWT505B8VxdCAbn9oVi5rOgaTQogVWBaC38Jefg:iq5teAbneVS6g0yWBaC3we

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

0657d1

C2

http://185.215.113.19

Attributes
  • install_dir

    0d8f5eb8a7

  • install_file

    explorti.exe

  • strings_key

    6c55a5f34bb433fbd933a168577b1838

  • url_paths

    /Vi9leo/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe
    "C:\Users\Admin\AppData\Local\Temp\3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3768
    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe
        "C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4144
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CC49.tmp\CC4A.tmp\CC4B.bat C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3744
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Drops file in Windows directory
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:772
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.106 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffd39e0cc40,0x7ffd39e0cc4c,0x7ffd39e0cc58
              6⤵
                PID:560
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=1828 /prefetch:2
                6⤵
                  PID:3984
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2104,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2064 /prefetch:3
                  6⤵
                    PID:3620
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=2184 /prefetch:8
                    6⤵
                      PID:1044
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3028,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3068 /prefetch:1
                      6⤵
                        PID:5764
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3036,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=3076 /prefetch:1
                        6⤵
                          PID:5828
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=224,i,13412406639748395957,3472277589898308575,262144 --variations-seed-version=20240730-050116.493000 --mojo-platform-channel-handle=4580 /prefetch:8
                          6⤵
                          • Drops file in System32 directory
                          • Suspicious behavior: EnumeratesProcesses
                          PID:6504
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://www.youtube.com/account"
                        5⤵
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:644
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ffd39cc3cb8,0x7ffd39cc3cc8,0x7ffd39cc3cd8
                          6⤵
                            PID:480
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2016 /prefetch:2
                            6⤵
                              PID:4604
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:3
                              6⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4424
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:8
                              6⤵
                                PID:3768
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:1
                                6⤵
                                  PID:4928
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:1
                                  6⤵
                                    PID:4020
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4336 /prefetch:1
                                    6⤵
                                      PID:5332
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4724 /prefetch:8
                                      6⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2468
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:1
                                      6⤵
                                        PID:2424
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:1
                                        6⤵
                                          PID:5836
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:1
                                          6⤵
                                            PID:6344
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:1
                                            6⤵
                                              PID:6352
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5524 /prefetch:8
                                              6⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:6728
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1808,17758712863865433883,8923562197084563300,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1036 /prefetch:2
                                              6⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4284
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                                            5⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:572
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                                              6⤵
                                              • Checks processor information in registry
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:3740
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1912 -parentBuildID 20240401114208 -prefsHandle 1852 -prefMapHandle 1844 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {48255d38-c5b9-40ad-9f09-46284b2b822d} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" gpu
                                                7⤵
                                                  PID:416
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2380 -prefMapHandle 2376 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21c47b60-df0d-497e-af72-672aa5538958} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" socket
                                                  7⤵
                                                    PID:2164
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2712 -childID 1 -isForBrowser -prefsHandle 3092 -prefMapHandle 3044 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c20e478a-4b2b-463a-8826-c0079766c931} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" tab
                                                    7⤵
                                                      PID:380
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3604 -childID 2 -isForBrowser -prefsHandle 3596 -prefMapHandle 2840 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a6900b-de70-4d85-ab55-66613bef2118} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" tab
                                                      7⤵
                                                        PID:2072
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4512 -prefMapHandle 2764 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51cf176e-5c84-4166-b0f4-d2adbc09b48b} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" utility
                                                        7⤵
                                                        • Checks processor information in registry
                                                        PID:5816
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 3 -isForBrowser -prefsHandle 5504 -prefMapHandle 5496 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9b4e633-23c3-4f17-a2d4-e4ab8653b76b} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" tab
                                                        7⤵
                                                          PID:5204
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5644 -childID 4 -isForBrowser -prefsHandle 5652 -prefMapHandle 5656 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32934223-3f83-4e3a-942d-b7dbb235b664} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" tab
                                                          7⤵
                                                            PID:5408
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5852 -childID 5 -isForBrowser -prefsHandle 5932 -prefMapHandle 5928 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9038d3cd-73dd-4764-9c8e-e0967d9107a8} 3740 "\\.\pipe\gecko-crash-server-pipe.3740" tab
                                                            7⤵
                                                              PID:2440
                                                    • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"
                                                      3⤵
                                                        PID:784
                                                      • C:\Users\Admin\1000029002\e0c898c8c1.exe
                                                        "C:\Users\Admin\1000029002\e0c898c8c1.exe"
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2608
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 1448
                                                          4⤵
                                                          • Program crash
                                                          PID:6272
                                                  • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1952
                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                    1⤵
                                                      PID:1576
                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                      1⤵
                                                        PID:6108
                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe
                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.106\elevation_service.exe"
                                                        1⤵
                                                          PID:5448
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2608 -ip 2608
                                                          1⤵
                                                            PID:6248
                                                          • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                            C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:4980
                                                          • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                            C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe
                                                            1⤵
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:6952

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\1000029002\e0c898c8c1.exe

                                                            Filesize

                                                            2.4MB

                                                            MD5

                                                            13eee6247b33baad8ebe94616c643e19

                                                            SHA1

                                                            f2fcfa779eb774e301e233e6ed78269295cec8f0

                                                            SHA256

                                                            fd81bd2ceacb5605548f0bf2ba0b67da7829ebe3be375cab39154daf23709df2

                                                            SHA512

                                                            e919df651ad6337b5ef764d1a3cd1353f520347bfd757768dbf3b9ead5176a69098f9d76752800247783c09bf8f0fced97843aab2622c1d5e08644bb4babb317

                                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx

                                                            Filesize

                                                            64KB

                                                            MD5

                                                            b5ad5caaaee00cb8cf445427975ae66c

                                                            SHA1

                                                            dcde6527290a326e048f9c3a85280d3fa71e1e22

                                                            SHA256

                                                            b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8

                                                            SHA512

                                                            92f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f

                                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock

                                                            Filesize

                                                            4B

                                                            MD5

                                                            f49655f856acb8884cc0ace29216f511

                                                            SHA1

                                                            cb0f1f87ec0455ec349aaa950c600475ac7b7b6b

                                                            SHA256

                                                            7852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba

                                                            SHA512

                                                            599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8

                                                          • C:\Users\Admin\AppData\Local\D3DSCache\cb00da9ba77862e\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val

                                                            Filesize

                                                            1008B

                                                            MD5

                                                            d222b77a61527f2c177b0869e7babc24

                                                            SHA1

                                                            3f23acb984307a4aeba41ebbb70439c97ad1f268

                                                            SHA256

                                                            80dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747

                                                            SHA512

                                                            d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            264B

                                                            MD5

                                                            bd57db7062e7ec8ceef52341bf32c404

                                                            SHA1

                                                            1dfaf70968d30de867646c74cf06db77f0166ae4

                                                            SHA256

                                                            734723c0530161eadb52b89b01dfcbb65177f9c2ab6408512ceedfc066d64e85

                                                            SHA512

                                                            26cece0737bc832a79309d442195b29474af5b52ec538c9337568122fa71e072c247327d520fe80838969a16c1c7d23ff9c46965ace1f05b1ff08d09671e8305

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                            Filesize

                                                            3KB

                                                            MD5

                                                            91aa77cef5cd0d3ca0d5dc4dc623b988

                                                            SHA1

                                                            fc6f0665af49e14092bb48d79c1c3b3cb47ec463

                                                            SHA256

                                                            a5c39f6ca4cb456185868a200c7decc96d5e039707358db2a5080a54faaf81a4

                                                            SHA512

                                                            8789d5b1d70be9d02176dbb02e10ddc5e7333d9f9defd9b1552814dadc40e7c6b5b769210dc91a9369bb2dcaf8608a581caef1268575355391cb0cc8aa1cf410

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                            Filesize

                                                            2B

                                                            MD5

                                                            d751713988987e9331980363e24189ce

                                                            SHA1

                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                            SHA256

                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                            SHA512

                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                            Filesize

                                                            356B

                                                            MD5

                                                            1d80e50951b71e44f7b0c71fb0acc9c8

                                                            SHA1

                                                            3fe88b7ff2ccadbe572e42b38ccde01036d2e27e

                                                            SHA256

                                                            1b32a6a6d1f83db93e084dbd006e4d6f9ae126f139bb67698699757386a5e425

                                                            SHA512

                                                            c0a78994f2acfc50b5f020a9f21b6dedbe0443ecd33d104b0eab970707a725e86286a420c1da2b39c498f8b587da0da131f72ed2aad00ab4c1d17d5abac3f221

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            6819356fe33a4bda8ee84b109f3fa0b3

                                                            SHA1

                                                            dca5dfc372eeca98426388409f91b0437fc9ed5d

                                                            SHA256

                                                            b7b6b68ec2c69a85c3153003efe1792806b598a12f129dcf43a1c17b6db42079

                                                            SHA512

                                                            6b86f5069ab126230ebc68c9973ad06933c9dcaa910dca472095466a376d8f5098eb522e45e61d415ef1eeeef8e5a931e5055dba3e48bd43ef5e98d9783d7738

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            d021802a3efbaf89c152d015a7ef4cec

                                                            SHA1

                                                            982616c44bd00182264c8be062dd1dbc3bc37805

                                                            SHA256

                                                            4729fb9f27d8532c21ef8f88b8c9a3bc7b0d6a41b035ded2dadac3eca85e7a1b

                                                            SHA512

                                                            ebdbb70e7265408a72be76a4b9a1f944504fb26ee71a4673761bbdb2c78693b983bbacefcb84b89da1eb769229dcc98b6024bd37c493726f14589d494d033c1b

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            1dd84491602a8cc3d41c3bf313537631

                                                            SHA1

                                                            0a75422b8dcb6897e1c80754b5a4acd96529671a

                                                            SHA256

                                                            3bc6cd97e7a451c7f4197b0f4f716eca074fc81a83174e8d03b34114ae680ef9

                                                            SHA512

                                                            aacc32da81001a03cf047dcb50f638154b853244f13a128647f4296de1be94751c489965c6d29ba530c307d74caafb2178eb010322ff26521e37daa29f13001a

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            5441f9ea96de7b39fe619c75f3b7e503

                                                            SHA1

                                                            e153327f75d94afde39d4d3b47726fb1ce7ee2fc

                                                            SHA256

                                                            05ca0616fdab6dd33ea4d45f6a6787733e6549dea777e22dfcb621f65059ca28

                                                            SHA512

                                                            3f5d9bf9ede7c2b081523cc0f5d773211562c391c4eb0fe8943a1e261b985a251a45569dc1d31f8c1f04ad683285961855e41be5a6142d276f28af05ea1cb842

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            8bea9405109db370e0cadc47bbc6dabb

                                                            SHA1

                                                            860bb62f556966bf049861bc22eda91e4a9cb49f

                                                            SHA256

                                                            809ced1836a0d90dde501805b780dfb44e9ce14d8ff74d19eff3a8b7cdb37f2d

                                                            SHA512

                                                            f1ba533a34c9c967a575c9e08472d5f8e7bb5a3ce4b5011c8599df9386720c01ef57629ecbc2c82174b9eb3f15bc2c6a15a8b26a15704fef57ad35b0480f7268

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            369889ce593b5e834d11e6a2f8097f60

                                                            SHA1

                                                            898cc518ca205c0c3515a63fed6c9a5f146b1f27

                                                            SHA256

                                                            fe59558a2545215914b63d745b77cfe9ae34ce0f95908d582af378c62e778872

                                                            SHA512

                                                            bce8bd90ebc664528e3edd8433944fc78be4b344cd318748f5702452095d692f53e74c554d7b866cd8c1b84a64d09252dc539d624bce43972f01dc8f3d00ef04

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            a3aa7baa246ac609155ab86818acf44e

                                                            SHA1

                                                            50cd5215ef0addf4e7aaf0179aa12cb3b2787310

                                                            SHA256

                                                            8fe485cc980108350448c51f1593e76bcb006b388e8bba7abd5d7f8ca75ea865

                                                            SHA512

                                                            051a8710dc5d300a30ed3a8e32cdafc90c665b674ac8dc6dc3fa73aec451ddb93411508f29cac894975d1f2cc8e64a68f20033389bde7a4bfc995670f804a963

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            fafed070db3571f2cd455b488aec3fbd

                                                            SHA1

                                                            cf6d149292bb6f2561a31e45dc3e807744a75c27

                                                            SHA256

                                                            e041741b580cdcb1234c568153230b077a37ff2013b8651ee8ce7b421e29d20b

                                                            SHA512

                                                            fc012f2e52a09e99f7cf5397ee2549bceff6644720e6df4dcdd5529915a26f067ee8f616cfddfdb12c1e06a99e221a8a7be250255d340ad1b70b902496da3214

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                            Filesize

                                                            9KB

                                                            MD5

                                                            c5b94e7ac7159df1901ccd46d807dec5

                                                            SHA1

                                                            9262870d70a7883eebe4468ad8f4eaa3f2ec327d

                                                            SHA256

                                                            6098e8f85eef101605250c600316aacef59ca71d24af639409abf71df6318e83

                                                            SHA512

                                                            0f0286c6b007618f1088a6c84d264b5a36bf993e1a8cdc53ac9f50f28914c51c9605354295c560d1fa4b91b3769ba3b03e9d729714a28d08d622b73bd6aa92b2

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            100KB

                                                            MD5

                                                            0323c1ad040855223dabdd9cb663a32e

                                                            SHA1

                                                            33cdc33de961399d9fc2da083a10c4dbfd847e32

                                                            SHA256

                                                            3454ead6fffba6f30687e8effeb1051d8eb4f43d864cdf12e6a79b53d829ab15

                                                            SHA512

                                                            06aab1d2711659e455d40af619562db6d515cefadc72dbf19f2d73fda95092b8171f978aa2f19ce231e72c78cd454eb939f23b64ecf5ad34b7f95f243b9993d7

                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                            Filesize

                                                            100KB

                                                            MD5

                                                            05503bec8116954d636620acf175304e

                                                            SHA1

                                                            4edcfe69ca783a56f5b5538c3f6c0af40c06b960

                                                            SHA256

                                                            b604066ba97957761423f001d55708533e5cfb1fa2b779ccf727be7769252ef2

                                                            SHA512

                                                            23f6ec22bc8fa5b69f3efd29f2847df62ec3527341052213effc8b690dab0a06a11930b1293c1182aad52e60aa49925b7d9a58bd5f2254b255b5694c60ad0ac4

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            63cb45e3f96b8c6c1ba49b00b759d0c9

                                                            SHA1

                                                            834d5b6a3499947e31278c13a296c950e19b2f9a

                                                            SHA256

                                                            9b7241b1a66ebbe196c1c3c8349d8076cf10909619807558d058509809ef81f6

                                                            SHA512

                                                            8c0c03e5a2bc77e3c38246acf43ede102d3094d43607959c2762c6b96fd199d89144e2eddc01a03e9d337d2c125a87aeb8367ef023757c2f2a57f9d23fe29ee6

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                            Filesize

                                                            152B

                                                            MD5

                                                            0ce5d292e9dab802a3c25f387277f3e3

                                                            SHA1

                                                            afeab24faf943fdc8a89b2ec0b427cb4d38c87cc

                                                            SHA256

                                                            011c29b70b474f741b42164aaa91d7986b4a1e817e8921f4b369dddf5a2f6cb9

                                                            SHA512

                                                            86a887988c29adf4142248557cb98a6bf7867eaf3bfec8119f5bd52146ce1b1bfae39967dad757da4fc3a50ce198d170078c87958269e24e46db58c842eeb775

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                            Filesize

                                                            33KB

                                                            MD5

                                                            60b8b39a48e099a79b96aa1cc1e0cfc4

                                                            SHA1

                                                            fdf8cae154235a990f757624591ec05b3891ac26

                                                            SHA256

                                                            cb5000e7cd62ab7f1fe45f8eb4ce9c4187f7b211436fa7dfb3aa2fef44400854

                                                            SHA512

                                                            0976939732ffc39a891c13248508fb2473c402a0f83cd1abde02db00c71404ae442537f71b596e6ac64e91f16a9f15d49f3af583d60f87812dd0916468534b58

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                            Filesize

                                                            38KB

                                                            MD5

                                                            6cdd1833d5b7bf4d7dd2f4dac5b6a08a

                                                            SHA1

                                                            54ae217a93901471ac46fb4d3ef81ad0d4571c8a

                                                            SHA256

                                                            dd3d51cbc6460eaab9f3d7af15c7bd23f76cb3889ac65acdeb33a0575532f0f2

                                                            SHA512

                                                            47f5433c2916c84c28a8f48ea86150ffaf131ddb616d39e6d529fb07ef3fa8ade33bd8633fe3e015a6fa0b068d3e6a5a1cb69fe78ce0dbd3f2a8eeb0b61a8aef

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                            Filesize

                                                            216B

                                                            MD5

                                                            d625aebd97d7750bd353e61007e81961

                                                            SHA1

                                                            5cd034fa2745a6eaa808ad65431920d7d5bf7f92

                                                            SHA256

                                                            3d79ed70ae4a7e5c26a805e293cd32db06bfc2a686107f14f0d01a29f85a4024

                                                            SHA512

                                                            81c90714ab025848448ff5742250ca0258623ffeaa46f7b2b2c4eee8a5e30f7f15842cbc8caaad2adce1e0811f996c8fc9a0831e1b7b633063c53e80f6f63b60

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                            Filesize

                                                            1KB

                                                            MD5

                                                            093f51876e8a59f7e07d39a63825bc18

                                                            SHA1

                                                            7705c4b9a4018f953442114e7334f12e4384e8fb

                                                            SHA256

                                                            fd4b95d53f8905297d66bff01f893a8c1d220300e30f96e5980d9409d702592a

                                                            SHA512

                                                            92396b0ce1f3eac8adc19ed798152e7a6ef35c13ddff638aa52becd2066b2e1d6f2265abba6be01aae6e1e3edd1d567803aba5f64084a3daf1e9c69fdb044723

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            5KB

                                                            MD5

                                                            2fc3283e9df77845a5cf484f12439c0d

                                                            SHA1

                                                            40f0bd7b11eba06d25dddc9e528b8f9eeb21f264

                                                            SHA256

                                                            c96fd0a80e324b2dcba77576a3aa8b08f9d8a2e7d32713cee0966f061bd7036e

                                                            SHA512

                                                            b33fab1e03f36e17596435f4902587bfab90908e7a9ca48a71b17d9baa7c07902a870996dbbf073297b6921738ce94852a07dad3aa6c091b46680d5206a11134

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                            Filesize

                                                            6KB

                                                            MD5

                                                            31fbab3af6e45badd7b1a1a73003f24d

                                                            SHA1

                                                            e4f4b1831b72c30db8e37d8044cdeb0cdc30c640

                                                            SHA256

                                                            28ffa2a429fc2b08855aa77a248dd3e08d6d6f2c74ea358e05c3abe4214b681c

                                                            SHA512

                                                            688c5e47db73eaab8f831d5e570d8591bacfd7e87eaadafc945b6bdb20681dda07ec83e62674e6f057ca90c61ecab65ebccccbdef579b1cf640fde00af003f61

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            206702161f94c5cd39fadd03f4014d98

                                                            SHA1

                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                            SHA256

                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                            SHA512

                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                            Filesize

                                                            16B

                                                            MD5

                                                            46295cac801e5d4857d09837238a6394

                                                            SHA1

                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                            SHA256

                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                            SHA512

                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            caebc4a089c25f8107b49d44f1e17d34

                                                            SHA1

                                                            8f185b0aa6043e2e1927739ebec9a29ba29767d6

                                                            SHA256

                                                            78f0ec91810a7224055fb83c38fd03e732d128c17df41fc1e247d17c2b58f0bf

                                                            SHA512

                                                            f8b184ea30bf9d81a15102cee22f7a67d221d45f5c45923eac46b403fb5a480d8c9fdc7e5f899162793c01bf4442fe7c562934a5331b4c8039b75122633458e0

                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            e7f27a0ae25779bda84c1a50f7306351

                                                            SHA1

                                                            def994b31cc71dfa99bc6485452c043f7030aa74

                                                            SHA256

                                                            dc36206a9489cdd32da0058952c1595a5fbab1723297df804c2e0d599ecdfa46

                                                            SHA512

                                                            a86fb4298b8ed5626fd7ceb45f24b4071c46fc10f9f6b5f463cc032584d813f53d315e2bb2db32ce8d154a2afb203cd41cb63b77d9f764be50c9f4cc01336002

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7f5xogbf.default-release\activity-stream.discovery_stream.json.tmp

                                                            Filesize

                                                            25KB

                                                            MD5

                                                            a450819ba7cdb816573394a37b2f3232

                                                            SHA1

                                                            326d1ca0719c96e97bb1866979cc0445a202392c

                                                            SHA256

                                                            9f385b754b07561d4bdda4f1f0937afee086168cc991c95acd7aa5877532aebd

                                                            SHA512

                                                            db6ed02b0b559e82b925b5f6924c1c690fffec7568d9f93bb27d0235dacbe4c36056b745099aeeaba77f3f9ab4c2605825dee38c52d87b3089755eacb6ea3ba1

                                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7f5xogbf.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            08d5aae9734e750c7bc35b86ec616b0a

                                                            SHA1

                                                            c529bbfa3dcee931d82302db5901dcedbf69dc4e

                                                            SHA256

                                                            248aa86bee57b06f5434b490b128ce71a07a8dbc1c78c572148359d501e2a080

                                                            SHA512

                                                            6ac55dbaa872fee5df3f1046201e5af5f5ca05b1f1b83b7edf5baa8feaa0147b5aaf39eb68131455734ff6146cb2d8d9500be2ce3e4cba111349803455749a81

                                                          • C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe

                                                            Filesize

                                                            1.8MB

                                                            MD5

                                                            09e01863cce03edfae832f8919a5333f

                                                            SHA1

                                                            d0b8e0d222dce89cc49a8bfab16485155a51fd55

                                                            SHA256

                                                            3fe86f16a2d125df9cbc70c53e29395fcbbfbf93830a4706cef8a67fbdb93232

                                                            SHA512

                                                            2edb30a7b1969fb4122a11165ae6d696bcc79f277255cd25f492d2e5c40cda83be12b0f2d066a8027cbe7bfb14c80cf912c4898f3431e30610c4439cbc7a3566

                                                          • C:\Users\Admin\AppData\Local\Temp\1000020001\5b358c2158.exe

                                                            Filesize

                                                            89KB

                                                            MD5

                                                            e79982f20b14a98a0f7d8a56a2ff8849

                                                            SHA1

                                                            76c42ae1a0268a9b2cf4d62a83a9c14762ef2a90

                                                            SHA256

                                                            2807f731d05af9d345790484853aae47dd3485e51a6b8a340c3834cd47962b71

                                                            SHA512

                                                            f5d06c06cce01b9b9f96dfaabf333c381984b695759e7b7ad5a4844056a8600d958b2311879e0a4a218ee10c2afb3c69164275616648b28845e3eeeec49d1679

                                                          • C:\Users\Admin\AppData\Local\Temp\CC49.tmp\CC4A.tmp\CC4B.bat

                                                            Filesize

                                                            2KB

                                                            MD5

                                                            de9423d9c334ba3dba7dc874aa7dbc28

                                                            SHA1

                                                            bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                                            SHA256

                                                            a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                                            SHA512

                                                            63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                            Filesize

                                                            479KB

                                                            MD5

                                                            09372174e83dbbf696ee732fd2e875bb

                                                            SHA1

                                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                                            SHA256

                                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                            SHA512

                                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                            Filesize

                                                            13.8MB

                                                            MD5

                                                            0a8747a2ac9ac08ae9508f36c6d75692

                                                            SHA1

                                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                            SHA256

                                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                            SHA512

                                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\AlternateServices.bin

                                                            Filesize

                                                            12KB

                                                            MD5

                                                            c9bf17d55f544cc2b44da1852678745b

                                                            SHA1

                                                            e7a4f6d2e88c892b1e619755f3b2921068cb0328

                                                            SHA256

                                                            ed1ae51b8f0cda48bc0e453f540c5392900baf79d19f481e41b38f6e7479fcfa

                                                            SHA512

                                                            f9b5c238016b7a3b1ca7f6a63c451093175b6de9708e47e461119c24f97ad460e5cd9b713b84bee338181d3bcf4e65cfc175b850d000d04fd1e6f6ebdd152583

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\AlternateServices.bin

                                                            Filesize

                                                            17KB

                                                            MD5

                                                            cb8e7ac0f50768aebfbce2ddb7c54c36

                                                            SHA1

                                                            86f089444ee6f17f1614134e63bfba97966a29cb

                                                            SHA256

                                                            2cb1554b8d1ff0b2502d9a742dcc95d2484ec2fc8e8345a8af63f9a39da67326

                                                            SHA512

                                                            67bdd6c0b766e9e4e0fca32d0f91a8cbf155d4e9a0c459f02a10dd2261f70abe325ad76158e525d0759c0fec0ce21eb80dc49838689a58fe4d4456b8e0b48498

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            24KB

                                                            MD5

                                                            8239dd95627cfd3771466cfacbebe8cc

                                                            SHA1

                                                            d869286154ac00c102301ea226a3c59b4152ec68

                                                            SHA256

                                                            96a5ad5327d1ee9c93ebce84f47b13ff82a25d9a20af56352e4c57036cfb0714

                                                            SHA512

                                                            58772d3c2917194b0ac1b9d4f498fd176dbbc721dfefd6642ddc80011dfab66df67d4124ce4a225a829d9de0b3173b0fc6893775762a53116c93809160256b98

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            21KB

                                                            MD5

                                                            a14f3c5af28db3a9cbb346a0d05c02ad

                                                            SHA1

                                                            d53930bf11973119b1db15a8328df2d0514d30a4

                                                            SHA256

                                                            c5c329b3f027fc9acebba53e4c8ed06c6504bdd9426dbb0772ff6e67f6b1b818

                                                            SHA512

                                                            f7ae850e34498d3e8c458f08a88501ad9965587dd14039fa3c302c250b72b4bb46c8a3b0561ac9801e1405d4991257055da4430edfe2302894bf0f1831549e4f

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\datareporting\glean\db\data.safe.tmp

                                                            Filesize

                                                            21KB

                                                            MD5

                                                            ed46108a5fcf761f84fc3f11bd109d96

                                                            SHA1

                                                            9d390c8e347a949b52979b032b5381b548a6b947

                                                            SHA256

                                                            0fb414570ab2e2bdcef3c089e2f681f8b92b145957674b789f4b1187c5fb599b

                                                            SHA512

                                                            c860f42eeee02d4636604faa8b757469aa4f10d94b011c40ac64d4e75a2cd4289836aa34516145e0960847d39e16b0510afdde098bb4a3d0b0e3decb6238671c

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\datareporting\glean\pending_pings\86f2a4da-1897-4dd4-91ec-ead056270893

                                                            Filesize

                                                            982B

                                                            MD5

                                                            d876674cf6d2fe9520981b11a8708eee

                                                            SHA1

                                                            2ab3ef177e308c37c8e3b19c3712e67ae44dc5c2

                                                            SHA256

                                                            566c43ce285d205e2a4077233be02378d0ec42059d0384bc587056402bafcee8

                                                            SHA512

                                                            4b41b6b0d930f2bf3bbe51141cc602df58e8f8c92bbcf45ba62db6329a9908fe02f698a934f8ef6848f91ad60cf3806c0c29a32290b81d0616d8806fffc95278

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\datareporting\glean\pending_pings\e5f195d8-eb67-4e80-9b0e-b2f980dbfa61

                                                            Filesize

                                                            659B

                                                            MD5

                                                            2304eb53836975abeca92c98cb8b0dd9

                                                            SHA1

                                                            1e122e0987f218e97e6a1cf5870ca5e207eb4e7d

                                                            SHA256

                                                            72fe0656c6dbc204f34583d1b9cd127c0217dcf073dc23eb57572b734dcf0510

                                                            SHA512

                                                            3c36cf26f116f7411523a8ed2bdfed2209d39c419d8da75713c2361f1ab1e34e31979dcfe6d917f2c163fb91ae9e6872b990e716c7960ac8e35e87bbdb0f747c

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                            Filesize

                                                            1.1MB

                                                            MD5

                                                            842039753bf41fa5e11b3a1383061a87

                                                            SHA1

                                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                            SHA256

                                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                            SHA512

                                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                            Filesize

                                                            116B

                                                            MD5

                                                            2a461e9eb87fd1955cea740a3444ee7a

                                                            SHA1

                                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                                            SHA256

                                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                            SHA512

                                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                            Filesize

                                                            372B

                                                            MD5

                                                            bf957ad58b55f64219ab3f793e374316

                                                            SHA1

                                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                            SHA256

                                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                            SHA512

                                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                            Filesize

                                                            17.8MB

                                                            MD5

                                                            daf7ef3acccab478aaa7d6dc1c60f865

                                                            SHA1

                                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                                            SHA256

                                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                            SHA512

                                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\prefs-1.js

                                                            Filesize

                                                            11KB

                                                            MD5

                                                            2c8ee7949f524d90fff679d062632ef0

                                                            SHA1

                                                            c173a5bd943066ca595a48cae75f9797d1f0dbca

                                                            SHA256

                                                            e0322cf2712b36b1dd934822cadcad32370c2ebe5c0071c8c478d3a4c5e6347e

                                                            SHA512

                                                            9635026f3477927f1777e61769d961ce05ad1428dbee49116728c497ab75d8fa0154ae958a4c41be6717ba491311c66b953abb43b256bb958c2116a48070ced7

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\prefs-1.js

                                                            Filesize

                                                            13KB

                                                            MD5

                                                            bde78f20bb009a89778de600f4aaee94

                                                            SHA1

                                                            908605357da81cdf70935595149cb0c683871a87

                                                            SHA256

                                                            fa75e3150dfa6210d845d45691bfa63f088417fde2897505f38f93533e16f8da

                                                            SHA512

                                                            9d0e7c69ab812c2f7c0450dc25266a58b103141d8b0e573ebb203e7637f6f628b2a796651db66753de13777092b3026cebe6384df42ba4c88e7186a90291488b

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\prefs-1.js

                                                            Filesize

                                                            16KB

                                                            MD5

                                                            687a93d9e195f2db3718345e272e2423

                                                            SHA1

                                                            70532b4848ddad83d6965bd3895d9be64fa36cf8

                                                            SHA256

                                                            41a28ade235bb402c8a2acbbaec6428f1af8c619b02c5f9aa0c5736b90260369

                                                            SHA512

                                                            88b276bfc3e68e30080e6688750800a4dd68ae18da33c9b381e7c4446398942bc15373b4f805109714db251f2cedbda0de2ce521c92b9858e701c2b697bd5d5d

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\prefs.js

                                                            Filesize

                                                            10KB

                                                            MD5

                                                            bfd1b40cdc351d24c82f7c45e20f0056

                                                            SHA1

                                                            bd43fa0a3502d1960eb36094a97c48f59726d495

                                                            SHA256

                                                            6d9d3d216319aa958fc0305eb58d22e0dcb642401aaa15890554b3da121d2622

                                                            SHA512

                                                            7c9cafcf6d1703051f8afc8e031331af9ee22be98e490e7462fc98d01ab76d4d2ef3da01f409f286c6f9930db3249257c29647c643a508b0d710517d12a65a59

                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7f5xogbf.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                            Filesize

                                                            2.8MB

                                                            MD5

                                                            4e2a2251360f2c6ff47b23bb12700abc

                                                            SHA1

                                                            17fd9523e1f5e16fb418f9166a0f20213bad089d

                                                            SHA256

                                                            bff9de476fc7f97ce3f8c76d2eae207599fb5a7e124dab91de63d7e066d99952

                                                            SHA512

                                                            dc2fc1d9012b82bfb14aabe2c55b40d3c353cc7d8929692b6dcb7e27a98311ebde89848b57b06e303b4e930e9074d10a6f636e9d93d997c0b87348cefd0640c7

                                                          • memory/1772-19-0x0000000000D21000-0x0000000000D4F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/1772-21-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3859-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-564-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-565-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3848-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3809-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3808-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-17-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-523-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3260-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-503-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3798-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3712-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3724-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-22-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3788-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-455-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3748-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-771-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-3777-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1772-20-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1952-40-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1952-24-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1952-33-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1952-36-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/1952-41-0x0000000000D21000-0x0000000000D4F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/2608-497-0x0000000000400000-0x00000000031D7000-memory.dmp

                                                            Filesize

                                                            45.8MB

                                                          • memory/2608-490-0x0000000000400000-0x00000000031D7000-memory.dmp

                                                            Filesize

                                                            45.8MB

                                                          • memory/3768-2-0x0000000000241000-0x000000000026F000-memory.dmp

                                                            Filesize

                                                            184KB

                                                          • memory/3768-5-0x0000000000240000-0x00000000006F3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3768-3-0x0000000000240000-0x00000000006F3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3768-16-0x0000000000240000-0x00000000006F3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3768-0-0x0000000000240000-0x00000000006F3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/3768-1-0x00000000777D6000-0x00000000777D8000-memory.dmp

                                                            Filesize

                                                            8KB

                                                          • memory/4980-3739-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/4980-3735-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/6952-3820-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB

                                                          • memory/6952-3821-0x0000000000D20000-0x00000000011D3000-memory.dmp

                                                            Filesize

                                                            4.7MB