Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 04:01

General

  • Target

    file.exe

  • Size

    1.9MB

  • MD5

    a81ebe2f3d7643056a33f3ff671626b0

  • SHA1

    b6940c2609eb47b8579dc1ccc983ab42b14ada07

  • SHA256

    da6390e0e3971f3acc3e14d20822d54fe6a893c4a00a588efafeff55240e4b2e

  • SHA512

    9e2fdf99391de91cc8890652bf0d050cddd091c6cd0343f1e8d91d0301b2f5a55009c277dd718a02687ff7c061452ff42f5d9b2e70f765102f4d25ad66642e6b

  • SSDEEP

    49152:QKbODzsO727BACWwis1d2yXDdOGuxnOJpSMjjH4:Tks3BAC9l1UyTbqnOJ5jjH

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

fed3aa

C2

http://185.215.113.16

Attributes
  • install_dir

    44111dbc49

  • install_file

    axplong.exe

  • strings_key

    8d0ad6945b1a30a186ec2d30be6db0b5

  • url_paths

    /Jo89Ku7d/index.php

rc4.plain

Extracted

Family

stealc

Botnet

tale

C2

http://185.215.113.206

Attributes
  • url_path

    /6c4adf523b719729.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://necklacedmny.store/api

https://founpiuer.store/api

https://navygenerayk.store/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 26 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Identifies Wine through registry keys 2 TTPs 13 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 16 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Users\Admin\AppData\Local\Temp\1001818001\54691fd985.exe
        "C:\Users\Admin\AppData\Local\Temp\1001818001\54691fd985.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:3420
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1036
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe594ecc40,0x7ffe594ecc4c,0x7ffe594ecc58
            5⤵
              PID:3500
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
              5⤵
                PID:1004
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2156,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
                5⤵
                  PID:2372
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2404 /prefetch:8
                  5⤵
                    PID:3412
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:448
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3260
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4552,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2000
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4636,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3956 /prefetch:8
                    5⤵
                      PID:1776
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4516,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:8
                      5⤵
                        PID:3264
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4660,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:8
                        5⤵
                          PID:5284
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3160,i,18406452272990876310,2647773041594439234,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:8
                          5⤵
                            PID:5296
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                          4⤵
                          • Uses browser remote debugging
                          • Enumerates system info in registry
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                          • Suspicious use of FindShellTrayWindow
                          PID:5564
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe594f46f8,0x7ffe594f4708,0x7ffe594f4718
                            5⤵
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5580
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:2
                            5⤵
                              PID:5804
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:3
                              5⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5812
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
                              5⤵
                                PID:5848
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:6016
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:6024
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:5252
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:1
                                5⤵
                                • Uses browser remote debugging
                                PID:5368
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
                                5⤵
                                  PID:5308
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
                                  5⤵
                                    PID:4236
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2556 /prefetch:2
                                    5⤵
                                      PID:5524
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2348 /prefetch:2
                                      5⤵
                                        PID:5260
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14475409787855612554,6272305072561171051,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4172 /prefetch:2
                                        5⤵
                                          PID:4916
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsKKJDGDHIDB.exe"
                                        4⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:6104
                                        • C:\Users\Admin\DocumentsKKJDGDHIDB.exe
                                          "C:\Users\Admin\DocumentsKKJDGDHIDB.exe"
                                          5⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          PID:5296
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Adds Run key to start application
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            PID:2076
                                            • C:\Users\Admin\AppData\Local\Temp\1003778001\ae79cd1bc9.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1003778001\ae79cd1bc9.exe"
                                              7⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              PID:808
                                            • C:\Users\Admin\AppData\Local\Temp\1003779001\ab79dba669.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1003779001\ab79dba669.exe"
                                              7⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              PID:5300
                                            • C:\Users\Admin\AppData\Local\Temp\1003780001\8d6831a32f.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1003780001\8d6831a32f.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:5208
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM firefox.exe /T
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5368
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM chrome.exe /T
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:3512
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM msedge.exe /T
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2856
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM opera.exe /T
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:5664
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /F /IM brave.exe /T
                                                8⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:6132
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                8⤵
                                                  PID:6052
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                    9⤵
                                                    • Checks processor information in registry
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of FindShellTrayWindow
                                                    • Suspicious use of SendNotifyMessage
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:6072
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac26325a-5a16-410b-aaed-1d6c6f787874} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" gpu
                                                      10⤵
                                                        PID:4620
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {19f0bc17-82e6-4010-8148-3aa59edbbf12} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" socket
                                                        10⤵
                                                          PID:4968
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3284 -childID 1 -isForBrowser -prefsHandle 2900 -prefMapHandle 3252 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54a3a364-2c6c-4ca8-9a2d-af7ddc9a4cd3} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab
                                                          10⤵
                                                            PID:4564
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 3640 -prefMapHandle 3636 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57bbb041-3c60-49fb-a01a-53dafdf767ba} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab
                                                            10⤵
                                                              PID:3820
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4560 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4668 -prefMapHandle 4660 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e5a76da-01ca-47bf-b918-e808b2f1e152} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" utility
                                                              10⤵
                                                              • Checks processor information in registry
                                                              PID:5776
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcd2749e-46ef-427e-9e64-e3cf47a2c148} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab
                                                              10⤵
                                                                PID:5992
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 4 -isForBrowser -prefsHandle 5392 -prefMapHandle 5388 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0824979-3d93-4514-a93d-aac5a13ae15b} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab
                                                                10⤵
                                                                  PID:5628
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5804 -childID 5 -isForBrowser -prefsHandle 5704 -prefMapHandle 5708 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {074b72bf-c39d-4efb-ae6e-e86642dd232f} 6072 "\\.\pipe\gecko-crash-server-pipe.6072" tab
                                                                  10⤵
                                                                    PID:5688
                                                            • C:\Users\Admin\AppData\Local\Temp\1003781001\a6c12ffd16.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\1003781001\a6c12ffd16.exe"
                                                              7⤵
                                                              • Modifies Windows Defender Real-time Protection settings
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Windows security modification
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              PID:5976
                                                    • C:\Users\Admin\AppData\Local\Temp\1001819001\90c36e07c9.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\1001819001\90c36e07c9.exe"
                                                      3⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1744
                                                • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                  1⤵
                                                    PID:4028
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                    1⤵
                                                      PID:5376
                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:3140
                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:3416
                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:5476
                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:1056

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\chrome.dll

                                                      Filesize

                                                      676KB

                                                      MD5

                                                      eda18948a989176f4eebb175ce806255

                                                      SHA1

                                                      ff22a3d5f5fb705137f233c36622c79eab995897

                                                      SHA256

                                                      81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                                      SHA512

                                                      160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                                    • C:\ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                      Filesize

                                                      649B

                                                      MD5

                                                      8b26ec1dab6bb247d9b7132f384ede70

                                                      SHA1

                                                      e964fccf66498e9da15f5471dca18cc7522dff95

                                                      SHA256

                                                      bf010962c3fd7929317fafd684bd3b4f990ece8b58a52171280254c9d3113cee

                                                      SHA512

                                                      7fd538914252d293a03dfc082c5fde6d524457d5f35ab7a00a628ed9563b369ed70a55bb90b173a36ad90456f4b10f0068894cd59cb7f9caf8e891c996e98699

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\188cd604-f487-45d9-9829-febfc3c8022e.dmp

                                                      Filesize

                                                      826KB

                                                      MD5

                                                      7d349af2fc9ab6a255afb61f7176dc35

                                                      SHA1

                                                      e41c75b2afec338ac3d43bda8ed9f5a773b655f4

                                                      SHA256

                                                      3a79778584719b7e921c5084496401ebfafb5f7deeb908545f85e89985d36590

                                                      SHA512

                                                      f872df4b38b574ec4a188e6adbd74838c2046f13dc8951e80306459d2ac5570ebbab8115802e7b13523e37231247307919382b7057fdebb33023f8ae15c781f7

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2a087a26-707c-4633-a814-379a5fcb0943.dmp

                                                      Filesize

                                                      826KB

                                                      MD5

                                                      76dce7c48f2245f34226c095cf657647

                                                      SHA1

                                                      a0cbeb2dfbdc66d75a3b343121cb751fb7a7a0e5

                                                      SHA256

                                                      2e04db9512264abadde5f543ae71fa3b8a070ea700da36925e72465314250047

                                                      SHA512

                                                      60160706df24d01b7d7eb04494e4aeb2b152bf15590261be007716562f3b6b1cbbccd6aa344f78eb49a704916becd2715a0ce1ab54c6754f8590009189ab7a6f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3bd32a95-9f7d-416d-a70a-649cb497ef40.dmp

                                                      Filesize

                                                      826KB

                                                      MD5

                                                      7847791ca45fa955e00cecdab663f85c

                                                      SHA1

                                                      f67aeb3796857253496498dd6ae2838af835fe32

                                                      SHA256

                                                      597f670fe1d199047232ca34821c6abfca99c42a4c729ca756a17e949d6f22a6

                                                      SHA512

                                                      8ab70152df69ce82f6ae90421095986838977ecc32775208eade484833c464e1841c99dda7d2fed7e06caddc98fe1f349d492fe3562beb4039db711f6b0cea04

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\bfc3ff03-fac9-4ba1-bf1a-4f8466aba7ad.dmp

                                                      Filesize

                                                      838KB

                                                      MD5

                                                      435cd781811b5d944d3e8de31af394fd

                                                      SHA1

                                                      bbe7f6b4cda1143e940cf57fad589cb834d114f1

                                                      SHA256

                                                      987026a6114d9651af2f7bf6c508ec131c41d6ab7ac226858e67bc2f1b6edfa5

                                                      SHA512

                                                      d1be8a121c98edfc610ecc2ddf03eae23e2b73b60be08cec5ca442b2efcedd157721cf085d01cbf434ac89733d7ca76402e909fa082732c5d9a0edb9433b340a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c9473aac-5d8d-4ca5-9a22-43e1ec923784.dmp

                                                      Filesize

                                                      838KB

                                                      MD5

                                                      8709f5110697112320d22273e53786f5

                                                      SHA1

                                                      31280b2fe1f9bd8ef29202f2788b6d1e58b43d02

                                                      SHA256

                                                      fa08d8656ba71f86df0e3b59f31eec813b151113f4afe22c8c2d28db0a6b9ef8

                                                      SHA512

                                                      817a6668266a94a2e3660b4aa0b014d58e63ee21963da8fa6af1e3b2055a8ac85148a0ce156edf376296fb882efd32504f49aab6911a6d3b306a4d0b6e1d908e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      a0486d6f8406d852dd805b66ff467692

                                                      SHA1

                                                      77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                      SHA256

                                                      c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                      SHA512

                                                      065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      dc058ebc0f8181946a312f0be99ed79c

                                                      SHA1

                                                      0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                      SHA256

                                                      378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                      SHA512

                                                      36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      3e4cce500651abdcd5147c0c65d3605f

                                                      SHA1

                                                      3662b506921eb9d1feb958c77c3ec1920a5b195b

                                                      SHA256

                                                      676bc062541db16ecb4fb12ac38312cfe8727ae19b895096d8b8bfdf369cf450

                                                      SHA512

                                                      3ef85af064db28c3adc78da6049d2906bc62c5e24d779fe7e983770f90b7e1524c8613c4e4cc68f7be8d246a34011bbab9d5a80d04bd9b0026e22024bb7bc37e

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      d660babd5aa981a6b034c81092490b57

                                                      SHA1

                                                      a6c923c0d4018c6f9c332d55ed6a999d7856bcc7

                                                      SHA256

                                                      4825b7b479b335281f124b2ea1b834f37922c8003b1a2cf0e751a0981f843c2e

                                                      SHA512

                                                      c8ceac3154db8f8788478576407e38278e8351fde07aea7e12613e0d85794122c89299a532159c76e77225c488e3a6b1052101c01b00b8319aef6df2aaa82d1a

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      5b64f3207429c474bcdc88a626e31f72

                                                      SHA1

                                                      20b3a0679d722660c61480c997b7ecd26d449422

                                                      SHA256

                                                      5bfb98972b0f7fea176fcbfa7cc2b36e2eed7446021a8857d271f6fd7392adf6

                                                      SHA512

                                                      ffbb5168de2153eb3127f91a78192752ee4da7eb52d67190692f368bed50b34e52792f96fa33c223c76e30089e16f374823d678bb5676f08c95ad961eceda186

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      e0303fe083b156562caeb17e8ff3fe4d

                                                      SHA1

                                                      edc41b64cfb33b7867ed7ccf0bb161ee8b4f258f

                                                      SHA256

                                                      9023ce38015cc3d4901b545a752c326c1efe935ecbed40ace483390452db8fd6

                                                      SHA512

                                                      f04b49cdc5da83eb6c2b91a99bd1782d207aa345bdfdb0814a374af35b25f02783f521a30f156636c2e888b505eaf47f74c1166babceb0e8ad78c4b3584c59d5

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                                                      Filesize

                                                      24KB

                                                      MD5

                                                      74d71a9d053b1a8433a74271f5796b70

                                                      SHA1

                                                      fa14378e3e2c999af85f3907b61a7c75bdc9b6a3

                                                      SHA256

                                                      337cde37d2b3a2bf556d8255aa0dc3e4c80df130fd3ea91db08914ef4026efe6

                                                      SHA512

                                                      99aaff2525bea6b87c1fce0f1472942929ea2c883d64512c7605ec320c1abc8b27a5e23c6b2f41502185975ccd63d2009814953fe612b672effca5eb63a12e4d

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99

                                                      Filesize

                                                      13KB

                                                      MD5

                                                      db966b49b93ba953b718706269f4445d

                                                      SHA1

                                                      520964f43196db036455e5d520678a14301a054d

                                                      SHA256

                                                      e4fcda75e92523d05f0dce38c16273ea2a8727428bcbead3da51ba3523be6092

                                                      SHA512

                                                      f45e44d922dad46f39bcc6081809b7080e2e4593c81f98ea322c99b46381723ca019464c112dd0ed5789c9b66817f84fed7b85cd48f3bb1b7a2f95310e2999c8

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308

                                                      Filesize

                                                      9KB

                                                      MD5

                                                      388c949edb61dc81cf87cc58ca2360a8

                                                      SHA1

                                                      ccdb85e418a07f30e249603be99c835ed017548d

                                                      SHA256

                                                      250abcd92cb5296e6b19e6bce0750f941bc2870feea43fbd1b451ae2157e0147

                                                      SHA512

                                                      7d4043c61f3e0a1c815f69e7a369f4802451748992c4f336bbf1c1c3629b24f01a396fa4b03725b3b38b866e1324a579b3fdba1702ab02d65b02303906a7ff6f

                                                    • C:\Users\Admin\AppData\Local\Temp\1001818001\54691fd985.exe

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      7a7b151acbff6469cd2ace366a9317e6

                                                      SHA1

                                                      de52d683649a73ab42b11ac334547b3b08d916af

                                                      SHA256

                                                      9bd047162a8d770bd1e58f35aeb0060922c54d113c485fd4a077e138413d9e8a

                                                      SHA512

                                                      9f0fc2d2b3f1d915446c73b4aa44dd4cee13f72d523cf08346178580e4ae970facee15c3aed4d946ca509ff49486a4e1c646674523d6da44075f8866e75a2811

                                                    • C:\Users\Admin\AppData\Local\Temp\1001819001\90c36e07c9.exe

                                                      Filesize

                                                      2.8MB

                                                      MD5

                                                      df063d639509985ad55ecb88e1996ec7

                                                      SHA1

                                                      3d73ee7a250748a19a79f432f1f6f04d94cbd69b

                                                      SHA256

                                                      18b0c50b7c874affa1f17f79d68db8fc8f51c2bbaca1a4e8ace5d6ee2e7e7b1a

                                                      SHA512

                                                      005acbe97bed3d800aac04d151ac4f7a7122ad336125925a6c65c3e485ffdce7c12b5f15a86cf58190cf9df8e7eca351e8dd4305f64385d655a96113beedc541

                                                    • C:\Users\Admin\AppData\Local\Temp\1003780001\8d6831a32f.exe

                                                      Filesize

                                                      898KB

                                                      MD5

                                                      5b0a2ff070bb7ce5d571d25c7551b002

                                                      SHA1

                                                      1ebc1b0e42001aeeed5b70da38aeb069a6ffb30d

                                                      SHA256

                                                      4e5b0242f3baf767f0d143c66043159f8064b6a83b74189de1976e025bff0d79

                                                      SHA512

                                                      f8fac592b5d9a69a0304c25e38fe3540f96c2adf83c3a28fcceb6631546b87f56179fd87a54a3fb5ee23e26fe0a0165b898b3dbc62b5ddb0054cb62282b55132

                                                    • C:\Users\Admin\AppData\Local\Temp\1003781001\a6c12ffd16.exe

                                                      Filesize

                                                      2.7MB

                                                      MD5

                                                      64f5f2474816a039d95c700e760f982e

                                                      SHA1

                                                      4bbba0dd55802404aba464eb77819b30284ba33d

                                                      SHA256

                                                      a0bb58e919ed3cbdf13a85b4cede776e2a70b95b9882f4cd161a4c1d66d70fd8

                                                      SHA512

                                                      e90841bd5ed7d0cab072b890b5551023793f383b305909d8d342c5ee7d29f3b5c0f2c2b0dbda235de5d1d53f31c105bf879fb06cb50aef78c483f68b35cf0c24

                                                    • C:\Users\Admin\AppData\Local\Temp\44111dbc49\axplong.exe

                                                      Filesize

                                                      1.9MB

                                                      MD5

                                                      a81ebe2f3d7643056a33f3ff671626b0

                                                      SHA1

                                                      b6940c2609eb47b8579dc1ccc983ab42b14ada07

                                                      SHA256

                                                      da6390e0e3971f3acc3e14d20822d54fe6a893c4a00a588efafeff55240e4b2e

                                                      SHA512

                                                      9e2fdf99391de91cc8890652bf0d050cddd091c6cd0343f1e8d91d0301b2f5a55009c277dd718a02687ff7c061452ff42f5d9b2e70f765102f4d25ad66642e6b

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                      Filesize

                                                      479KB

                                                      MD5

                                                      09372174e83dbbf696ee732fd2e875bb

                                                      SHA1

                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                      SHA256

                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                      SHA512

                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                      Filesize

                                                      13.8MB

                                                      MD5

                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                      SHA1

                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                      SHA256

                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                      SHA512

                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      66e7ec0ceec8d586eef7d63d20ccfbff

                                                      SHA1

                                                      48e7b69ae2df535075909b648e23f87d73019ae7

                                                      SHA256

                                                      8d7584108ead758215df83fc9de30b2d87816279807301a82ed511e02ad1723e

                                                      SHA512

                                                      81639b29d5405409b80bba6753499852b147ff975c725f5c9ea61b306ce4f4ef8f1fb551006839db083f8f03020bfa5f043be40974e2f90d7c3cf4faa6ab08c2

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      229092799b9ea5e1f95e3c5b9fd698b5

                                                      SHA1

                                                      68893b5e1c5e48ac228dd5648611609aa6afa6ed

                                                      SHA256

                                                      a37fe0504ca340062e4690d415f0bdeefec9f9e294ceeb2158fb2f228008fe2f

                                                      SHA512

                                                      7ae3b490e28bf4b0ce52b3996b8b2bd3b6c162af1a3e362e1d8437d00b7259e47f007a23851a920f363b527deec21367a64e8ab8d894724e60f8880eb50a76cd

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      b8234226c31db2b799bf287c44f02c58

                                                      SHA1

                                                      a48d2c7882759d836e07478c72e5e4c7512fd640

                                                      SHA256

                                                      0c569493c6f0d38bbd3c9a3c63751f901887eaaeae00355f926f987e0ef9c97e

                                                      SHA512

                                                      34c8d5e40ebaafb9e21b01d4355db0ec5a13358d84570e82fa4757375519000fc132578c7130b1c16c931fa01784e4f47d6a513fc573ac32fd61c5f54785ed24

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      2ab20863a6e383d794d05d369ad463c6

                                                      SHA1

                                                      de85c017a952c5348941b47b89fd935e77012278

                                                      SHA256

                                                      650f291c1a88c90175cef8aaf61a6a821d9e0625b538da89f10d14ef93a1c67c

                                                      SHA512

                                                      9554cb00ba1efdd08e397e843f0084e063648273648f6648cd19c001d8e9ab4020943813c6fe6d5546fcfa5b3e67072fb07d8883f1bdd9a05b83a15866bd7adf

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      6cb8f0c213167b23e9fc19e16d1a03c3

                                                      SHA1

                                                      0c51de2dd9f6e892bb1faa74dea0cfe7cf782e7e

                                                      SHA256

                                                      0728cc1759c4abe2382d6fd9144c907abb49ddd98d1fb192bce5bc50a1a882e5

                                                      SHA512

                                                      233bf1f3c3c15a5c881b1adfbbacbc07938f664101d911e705934a094cf1ff3ce882aea4b493852ce8d44594f1c575849da93ce50897ecd2c97cb1b6fe1bfb93

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a8d2d57f-3b57-4541-a617-f3fb363810ca

                                                      Filesize

                                                      671B

                                                      MD5

                                                      928b885248da76f1bf47147c3333e882

                                                      SHA1

                                                      19ef2cbadb052bce24264823310bec6043bf8de9

                                                      SHA256

                                                      ca25d565c36d953271d50387f18247d9a0e11dab87ab12e5b3303174a6e791b8

                                                      SHA512

                                                      0c3b954ed03faf1326f39e3d185148db5681efcde2c444283144ec482984205b6b05f7cb71c93fa3bb40cdac2fae0376fbb0fa44814475468919280b48dc9975

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\cd698a42-f736-47df-a239-be4649081a73

                                                      Filesize

                                                      25KB

                                                      MD5

                                                      c0839e1c1cbee54be112a6973f8b4e69

                                                      SHA1

                                                      7fb0d528405d57651515f1df11babee6d23587fb

                                                      SHA256

                                                      600ecd91406c25b9797609eb4f7397dcddc25d2c6a6171bc3a6e0c69d9e2457b

                                                      SHA512

                                                      8a6f874bd3ac2f79b5c5c8843f0dd7d0f1f8205127f9c0cd9ffadb3b4051e158d8a8ea3bcc1d0b57c27d1556e2b7e76fa4a7ad2e69b4f73d66eed781a278c685

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\ffe69413-d036-4d12-9df1-8bd40e38bb8a

                                                      Filesize

                                                      982B

                                                      MD5

                                                      8bfb184d4185b9092399e64462991d37

                                                      SHA1

                                                      3969bceb720b4e0a0e8999128ced75ad599650bf

                                                      SHA256

                                                      1929d12befab240897db305d2bf01291f3748eec6197b7619d41b8b307f33b58

                                                      SHA512

                                                      2bebb1f5e52009314796b681ff86161f2b4574d5db640a290bf4bd34e4080db11f201a95f2c8aa9f49ef1c126a26069b17eaf7cc0b66da8a06e1e909cc0f48d7

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      842039753bf41fa5e11b3a1383061a87

                                                      SHA1

                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                      SHA256

                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                      SHA512

                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                      Filesize

                                                      116B

                                                      MD5

                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                      SHA1

                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                      SHA256

                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                      SHA512

                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                      Filesize

                                                      372B

                                                      MD5

                                                      bf957ad58b55f64219ab3f793e374316

                                                      SHA1

                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                      SHA256

                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                      SHA512

                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                      Filesize

                                                      17.8MB

                                                      MD5

                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                      SHA1

                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                      SHA256

                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                      SHA512

                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                      Filesize

                                                      12KB

                                                      MD5

                                                      32c9ba9cfb4d2cb59d0b98f204b2e745

                                                      SHA1

                                                      592cb1df92ccc32fe93b9ab7645c0b8be5145a3d

                                                      SHA256

                                                      1f9be894bc94be11c08509a324ce0047d9149fc128c81b2d582c57fea2c1b582

                                                      SHA512

                                                      c0703744b41781181bb2cb293e774d565f32cab6d99f2c8404714c594fc49647f582256b93e361eb542e5e68311887a96121ca8fe9f773cef9357bc22e36c001

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                                      Filesize

                                                      15KB

                                                      MD5

                                                      fdca8cbce5acde0c40b4dcc66cb52a80

                                                      SHA1

                                                      8ed868dc050c03e4f8919ef5eabf1b7669238849

                                                      SHA256

                                                      abd79d9719fb81b596e64d513e3d905682c4673e23debdcd954bfb11be31503c

                                                      SHA512

                                                      e97dd39f18fc2197bd739af9103fb5a68f1aeb51e799413571133b281831b0896cc8f08bab3b2042e779324353a348fba8ea4bb2421ffaf04dd4f57d782ad4a5

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      24d17de96ca19551cf93ac067d723674

                                                      SHA1

                                                      d7dc7bc050803cae5ddc533ba04758fcbc125a3c

                                                      SHA256

                                                      8f9144192305c77d44cd2f06b01471b90a8c56c165b90770b89b279eb7d4e301

                                                      SHA512

                                                      93288b1404bb596220791e972a3f28a6edff0da609382178a08f9d2b41cbd2562cc34a1b2d78728d3baecd4fed7f4d976a61200b1fa818d049766977aba725e6

                                                    • C:\Users\Admin\DocumentsKKJDGDHIDB.exe

                                                      Filesize

                                                      3.1MB

                                                      MD5

                                                      c9b431e11a92861c471d47467d66da24

                                                      SHA1

                                                      c585271fbc82891004f361e9b86c0cac43b904d5

                                                      SHA256

                                                      e1fcfa4324ed72ca1c563e4c710b8071ef07d06f3d3c99a1518c9707af23f7de

                                                      SHA512

                                                      a4539e09f956f04084f159b047667a20cca79221861ee7b1110bcd60b454ba577fdcd0a1f312ee73271ab0f84c1602a8abbf308d93cab23a37afc012b5a76c97

                                                    • memory/808-460-0x0000000000390000-0x0000000000696000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/808-479-0x0000000000390000-0x0000000000696000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/888-21-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-19-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-3534-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-499-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-889-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-876-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-17-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-18-0x0000000000731000-0x000000000075F000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/888-2883-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-383-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-20-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-3537-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-1350-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-3527-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-84-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-444-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-3541-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-3539-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-40-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-41-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-150-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/888-42-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/1056-3526-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/1056-3522-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/1744-85-0x00000000003B0000-0x00000000006B6000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/1744-113-0x00000000003B0000-0x00000000006B6000-memory.dmp

                                                      Filesize

                                                      3.0MB

                                                    • memory/2076-1153-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-843-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3540-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3528-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3542-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-480-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3538-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3518-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-2639-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-436-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-3535-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-476-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2076-883-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2292-1-0x0000000077D34000-0x0000000077D36000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/2292-4-0x0000000000CE0000-0x00000000011BF000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/2292-2-0x0000000000CE1000-0x0000000000D0F000-memory.dmp

                                                      Filesize

                                                      184KB

                                                    • memory/2292-16-0x0000000000CE0000-0x00000000011BF000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/2292-3-0x0000000000CE0000-0x00000000011BF000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/2292-0-0x0000000000CE0000-0x00000000011BF000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/3140-442-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/3140-439-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/3416-443-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/3416-440-0x0000000000730000-0x0000000000C0F000-memory.dmp

                                                      Filesize

                                                      4.9MB

                                                    • memory/3420-43-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                      Filesize

                                                      972KB

                                                    • memory/3420-412-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-59-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-101-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-38-0x0000000000D41000-0x0000000000DA9000-memory.dmp

                                                      Filesize

                                                      416KB

                                                    • memory/3420-39-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-37-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-110-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-422-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-116-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-124-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-413-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/3420-162-0x0000000000D40000-0x000000000146C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/5296-420-0x0000000000C20000-0x0000000000F38000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5296-435-0x0000000000C20000-0x0000000000F38000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5300-477-0x0000000000400000-0x0000000000B2C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/5300-478-0x0000000000400000-0x0000000000B2C000-memory.dmp

                                                      Filesize

                                                      7.2MB

                                                    • memory/5476-3524-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5476-3521-0x0000000000F10000-0x0000000001228000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5976-888-0x0000000000C10000-0x0000000000EC8000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5976-865-0x0000000000C10000-0x0000000000EC8000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5976-869-0x0000000000C10000-0x0000000000EC8000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5976-870-0x0000000000C10000-0x0000000000EC8000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5976-885-0x0000000000C10000-0x0000000000EC8000-memory.dmp

                                                      Filesize

                                                      2.7MB