Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 08:08

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    46ab0dfcc0d7963fb73bec088b2e576c

  • SHA1

    3300d08f1bb7663295961861bd51abe2a85ff5c6

  • SHA256

    2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed

  • SHA512

    637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709

  • SSDEEP

    49152:dr1+ox7lz+GcT2/2PlVULOrTECkun1W0Ro7:dh7nzWc2PWKkunc6o

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 59 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1688
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Users\Admin\AppData\Local\Temp\1007882001\a2f13f4904.exe
        "C:\Users\Admin\AppData\Local\Temp\1007882001\a2f13f4904.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:1772
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4280
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffef74acc40,0x7ffef74acc4c,0x7ffef74acc58
            5⤵
              PID:5140
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2064,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2024 /prefetch:2
              5⤵
                PID:4816
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1912,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1600 /prefetch:3
                5⤵
                  PID:5600
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2360 /prefetch:8
                  5⤵
                    PID:4588
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5396
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3264 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5592
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,4092547078972995013,6218732815557638330,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:6096
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5308
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:5496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1772 -s 1304
                  4⤵
                  • Program crash
                  PID:1676
              • C:\Users\Admin\AppData\Local\Temp\1007883001\401c94916a.exe
                "C:\Users\Admin\AppData\Local\Temp\1007883001\401c94916a.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:4684
              • C:\Users\Admin\AppData\Local\Temp\1007884001\04c24d163c.exe
                "C:\Users\Admin\AppData\Local\Temp\1007884001\04c24d163c.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3128
              • C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe
                "C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:1624
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4040
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3264
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2808
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2060
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4464
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3548
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    5⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:3724
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2040 -parentBuildID 20240401114208 -prefsHandle 1968 -prefMapHandle 1960 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {507c8106-51ae-4cc7-8941-f5dd942528b3} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" gpu
                      6⤵
                        PID:4584
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6532efeb-d303-4e92-8098-cbcdf90d860a} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" socket
                        6⤵
                          PID:3036
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3264 -childID 1 -isForBrowser -prefsHandle 3256 -prefMapHandle 3252 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {353b8574-c929-433e-a5df-530616455142} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab
                          6⤵
                            PID:2416
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2796 -childID 2 -isForBrowser -prefsHandle 3660 -prefMapHandle 3656 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e54072a-7a12-4256-8a79-b3bcddbbf19c} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab
                            6⤵
                              PID:4252
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4272 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4248 -prefMapHandle 4208 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f631b005-591c-4faf-8eff-66907828384c} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" utility
                              6⤵
                              • Checks processor information in registry
                              PID:5280
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5668 -childID 3 -isForBrowser -prefsHandle 5252 -prefMapHandle 5700 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a864226a-5a01-4279-918b-69b6167e925f} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab
                              6⤵
                                PID:4980
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 4 -isForBrowser -prefsHandle 5796 -prefMapHandle 5800 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21e889c3-2801-4ed4-b24f-b62b51e3e9f6} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab
                                6⤵
                                  PID:4464
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5944 -prefMapHandle 5948 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {103269e4-4582-4797-b05b-f75c4c5d7d68} 3724 "\\.\pipe\gecko-crash-server-pipe.3724" tab
                                  6⤵
                                    PID:2600
                            • C:\Users\Admin\AppData\Local\Temp\1007886001\5fdd9314ef.exe
                              "C:\Users\Admin\AppData\Local\Temp\1007886001\5fdd9314ef.exe"
                              3⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5300
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3252
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:4624
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1772 -ip 1772
                            1⤵
                              PID:2508
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2556
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2128
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:3448
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2408

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                              Filesize

                              1KB

                              MD5

                              9e47983c53fa07258a1497b627df8f70

                              SHA1

                              7b10a4e111a894da3637df0b37e5a85f8ce74c87

                              SHA256

                              6ba252af503572ef9a766db0b2bdb48aff51ebda582cb2efde94b2e239c33c49

                              SHA512

                              cea9bf34f9fb4d98180d0c27dc6fd2a5d5130362cb0621a641bea221186408d4e14085ff45444bdd65941090266cb4ac5928fc25ef344f7fd5d7ce0d7206f7fe

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                              Filesize

                              356B

                              MD5

                              324b18dfdcc1253746b4e4c801a72472

                              SHA1

                              3a7769e509cc996596f83e86851c9c83df35ebe2

                              SHA256

                              154e947be7108444819564bd49ef535dc8ce3337bcbc0b7925a4580be16f08b1

                              SHA512

                              9650c3613040e62c26102c8d0142f491d77de2dc7287fbb1b10d1ca9874d93195ad028f83c0d66852c424dd3e4c227e37b4af238f3d15bc2dfe4043b8db2c9cf

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json

                              Filesize

                              21KB

                              MD5

                              f920a92624bd515dcb969da072c200d0

                              SHA1

                              a9a6504e0374046e20b2edd70a30c6cccbcbb48e

                              SHA256

                              b7e11d7f58a5db4ca6f75c67013927c97be0e64d4bb001e45395fc72e41313be

                              SHA512

                              0e705810545e7f4a0c7896289f20de8ffd5a9f002673d190ed6bf5f62ad16e9656fb28f2af9e69c2d2b246b2a1bdcd54f3d2729aca35b435fd44ada8828e86a9

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              8f7448b79168fc96f8d55570be933ff6

                              SHA1

                              b00a2049a4c277a0f4e15d4f6b89fe3edb858414

                              SHA256

                              3cbdf19175170089697176b6ce25f57a1b43988951e847a6293e7452e16f2c6d

                              SHA512

                              aa0203d602534b52d5ce8dcdb8caa1d2a2d43935f49cd67343863e481276997e1b34e7f2c13fd2c7ae9bd7a5153c53b93c99610b8f40d52cde61d85a4fceec24

                            • C:\Users\Admin\AppData\Local\Temp\1007882001\a2f13f4904.exe

                              Filesize

                              4.2MB

                              MD5

                              6b7999360a3bba7b9c342b9f362d09b3

                              SHA1

                              eda0601fbe1be5ea51a1eb5bdb0df667329e7c72

                              SHA256

                              e58f6a0abd6378434abc6d2284e3ce60a0b177d2a01c3214c321016a02eaea09

                              SHA512

                              33caca1ab2b0ba80a6e8c8ec8caa109012a258ffb23951f26c301f0085a5699bbc2a58c5f3c90e944ccff88be76aa8bb88cee7a2be8e7c9620fe10aeded5f5e3

                            • C:\Users\Admin\AppData\Local\Temp\1007883001\401c94916a.exe

                              Filesize

                              1.8MB

                              MD5

                              370fc731525b5f7087a7de06e2de56e6

                              SHA1

                              1064c9d0fbbc6a762cf6d3c0639908952af2d3a3

                              SHA256

                              278ccd58931cdc130118295753d00791559ff374bd6629158c5cb8f7c38097be

                              SHA512

                              9ab2e45aa23a0c95b5575cf042b21b45ed61b6854d7d41446942b80618bff9bbca8e1485f7cd94854dd2e8fea46183d317387a2e1965b0b524fab1e7f7c74100

                            • C:\Users\Admin\AppData\Local\Temp\1007884001\04c24d163c.exe

                              Filesize

                              1.7MB

                              MD5

                              e28eb84120c7318b0f8fa7fc2bd79398

                              SHA1

                              f4a8dcebc79558c8640ffc6c0471c6a173d4853d

                              SHA256

                              0a8d7dc28c9ef08e79873c4446878a4f5b8a443fa31b4f454d606c4419a338f5

                              SHA512

                              cafcb6ca3a05f3b494592ca9fdd58a022befce7bf89786a99e57a3e8df2c86a22481e9a36615147adab3ee0db8a3f55cfecc4050fce9c4921c63a9caddd03b43

                            • C:\Users\Admin\AppData\Local\Temp\1007885001\853218adc8.exe

                              Filesize

                              900KB

                              MD5

                              b6f1752f8523257a02dc2b78c05025d0

                              SHA1

                              7fc0650f993cf2d6c2796e970f55105105dab707

                              SHA256

                              41e1a023075295a1c20f923bd4651405bf893ddb7694605f7c576d070c9b8579

                              SHA512

                              6bcecea3c0e5e37b79b08125e3d49de904a306809f3f31980b205ade0ed72823304387cad59622813a7932013af9cb527408b9aa11c37ac7d26fb7c2dc40ca42

                            • C:\Users\Admin\AppData\Local\Temp\1007886001\5fdd9314ef.exe

                              Filesize

                              2.7MB

                              MD5

                              1030d657dac585a568881e12dc2ab0f7

                              SHA1

                              aa96071d9a8ab685426baa62358cac33b9765621

                              SHA256

                              f915f6afd3ad47cbf769079b9c5f3bb5394877b0ae2aa072ca9ab46778a7810e

                              SHA512

                              58a2ad4792b5b4e2a2224866b21de0e83f36206019833a0c29f8967dcfc84e549cb285ac197631bab25e1b0575044c534ec8cc4127e176b27e324b387a99fd86

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              1.8MB

                              MD5

                              46ab0dfcc0d7963fb73bec088b2e576c

                              SHA1

                              3300d08f1bb7663295961861bd51abe2a85ff5c6

                              SHA256

                              2eb9ac7a217fdd500e26a8ad53d15f5a458a79240e58cb31348e820d338138ed

                              SHA512

                              637feffec1fb32c4c7e97a8184797b0df8c590eb83e2d2e659ff70b331510dcaedd186e18cb4bac00245cfbbf8a1f283f0bb290c0cc541f508476532687d7709

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              571709d0bbc24015026a3861c605e592

                              SHA1

                              a1e7c774017b4e974718964362be0fc8452c08b3

                              SHA256

                              8fe662f9e4141f6e51572cc0c5ac0e7d185a02d245a6c7fb8c44d2cde257612a

                              SHA512

                              1d9b6d15b8a9dbc9bc6a53130f7fe3ee47abc73d714164a251a7de8c3f88940fe4a4e3621a17845cd357cd54f73486cf21ab667ffb76e7720179ba14a907e257

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              18KB

                              MD5

                              9a9cf6b080eddb8610476ef3b68c7b78

                              SHA1

                              9cbf7392d1227d34bad984e55cc97b154a52aab7

                              SHA256

                              a8aeb03d31dd7d6fdf0bbd1cd70d34d34a230b4346743c73fd588c2737066b5c

                              SHA512

                              4a498ce0705ddd728d0fa159970262408857a7c4a59921132596b3e61b638fe97bd4c69a5358e9ee71cdc7a4efef06f76d2d99e8c764ccc4a1909125234517eb

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin

                              Filesize

                              7KB

                              MD5

                              eb2361664ece2d0a90d24b4eafdf3f21

                              SHA1

                              5bfc2989adc2c6aa818e82fe30dba6b5325ab625

                              SHA256

                              926c818df9ad98622da48cefd19086a3bfcfd6fd6b732ec89b0c77a7ae3978a6

                              SHA512

                              d315c5522703c58c9307271056beea549ab1fe28799877780841aea7b8539cacdbedb42b82c63515ce0aa569a17bd2b65bb474e08061afc101097c01db0ca392

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              832280c76cb95fb8323ad0b2903637b7

                              SHA1

                              61b0c0f0f705e89c21c675e8eba1f2f8720874cb

                              SHA256

                              8b2ef0067c9242c93b5c6038ffb5134efe1a5ccd636dda9c69e20100593d8971

                              SHA512

                              4a68c41f6853acfceab1bc2d1c01d5f7475e0c92117bb2738e2a270dbba92672b677425b1b59080a300dd3789087f9fc137e9cf99cb649eb070eca3cb0b00595

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              33327ecf06442587efa25e71601e75bc

                              SHA1

                              2c55f72503dc0a7075177b26203988d9fdac162a

                              SHA256

                              820febaca210ab01fd4d17b1ab8b159f92eeaf1b2eaea1b6aa3b2d1f7c5078ff

                              SHA512

                              5027fb4e1defa081ac2b92388aec2a20455cde131a457ff412d74ceb5ed672c01b5f9ac296bb57f1efa49e9bf175bb25a07864e74a255580a89570ff5198d963

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\2c63ccb2-32d2-4889-8127-f6bcff133306

                              Filesize

                              671B

                              MD5

                              25531eefdea7250e8085e4b2eefc66ad

                              SHA1

                              0a1f3629df6dfecf92c90c2002d63bb513a44797

                              SHA256

                              a2620511abcf33adcc7de315c1ecf330af17614b88ca8be7827e9f72f42be098

                              SHA512

                              53e889b26dbefc4cc0b0b06ce46c5cc35eef8800811898f8a6279987b0de1ffa8da09a7dde0e0cba2d23243b501321a15588ff51de007c0c18f00bd73f26b6c3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\c251d5cd-bbf8-44a6-af2d-b37b1e1b6791

                              Filesize

                              982B

                              MD5

                              9aa32fede468877e22a3e64901efa114

                              SHA1

                              335ff7c02ee9e5c0b608e22b8ce455b4da918a75

                              SHA256

                              e968e80c9874668c714492895571e687fc7563d63e1569a38d5642755d247777

                              SHA512

                              54dd885f7d9b17bd3b8ea400d2f3045c8e456931605355aaf4e6758e236cd39353a6fe9245613f4efc138bca209cf262599eb533f42f6153b2c0a9a4fd6b42ae

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\ca73465c-4eac-4a84-94b5-47c1f9cb4fb2

                              Filesize

                              25KB

                              MD5

                              a2ebd401cfac5c6636969ae48cdbebda

                              SHA1

                              f80483881826aab06fbc6cd7a2bc8b29a890b34d

                              SHA256

                              0ebf8f45f53f2a2e870d79fb324ad6db0a7f1716551d1265b7dc5ae09da5288d

                              SHA512

                              f1e6178819fc26d54a411375cb3c42bc119244940ebbde9abd653c2f49f4a5538074353a962d52ffac8091b5a5e4acf742668876bcd4ff23f6c1c639efd87226

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              511eb1031d357d70d8c51b636fda0208

                              SHA1

                              a3129f94a446d73231be6fced325ebacf6218311

                              SHA256

                              e4a30788958882f3b777136da2bd2c95d168234bc9967d115a11ee8ac10bb0a1

                              SHA512

                              600d866e2a1147fe289d817b387c2c3a85663af4697b5cda19179d68faece5ba22beee299035306da07e294196af6ed5ebb1ab14f1318a55a81b68c4ea71569e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              b06971576dc0346686673648b3064c6e

                              SHA1

                              716a8fc12e374eb66c651552aa24465f81d46290

                              SHA256

                              a337b6eab5e58ecc04a5f4585df0a3c6381153a41e22120fad53aab91846e2c1

                              SHA512

                              a618219d8fdcf1b6bb569ebd3c79f01e87c271afef835dded04ace12a3987550c74d72612f2f6bca8c3c090dfe3fb406885d406fe917c17d70d8ecbd13d9ecfc

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              f29f3418132dbaaeda98752647bd29cd

                              SHA1

                              997a42bac1c0cce1cf4473a3d2492984f50d7a19

                              SHA256

                              1349bfd723d9a88dd0081222ea4849423b25ea8751cccba40d49083c4f1b85c7

                              SHA512

                              0d6fd231f95d607110c0c1fe98ea03ffe3a48c3c650dc00840d586bf20274861517eb55a2216ebe4dec1f6ac7b45fc59226067983d16d478ee11ec26a0fc682c

                            • \??\pipe\crashpad_4280_VZWBAXOFTPLUCBCO

                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • memory/1688-4-0x00000000007E0000-0x0000000000C91000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1688-17-0x00000000007E0000-0x0000000000C91000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1688-0-0x00000000007E0000-0x0000000000C91000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1688-3-0x00000000007E0000-0x0000000000C91000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/1688-2-0x00000000007E1000-0x000000000080F000-memory.dmp

                              Filesize

                              184KB

                            • memory/1688-1-0x0000000077D44000-0x0000000077D46000-memory.dmp

                              Filesize

                              8KB

                            • memory/1772-38-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-3569-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-41-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-3557-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-778-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/1772-490-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-776-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-2968-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-96-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-508-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-3552-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/1772-75-0x0000000000540000-0x00000000011AE000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2128-3578-0x0000000000D80000-0x0000000000D92000-memory.dmp

                              Filesize

                              72KB

                            • memory/2408-3604-0x0000000000D80000-0x0000000000D92000-memory.dmp

                              Filesize

                              72KB

                            • memory/2556-3575-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2556-3574-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3128-74-0x0000000000380000-0x0000000000A21000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3128-77-0x0000000000380000-0x0000000000A21000-memory.dmp

                              Filesize

                              6.6MB

                            • memory/3252-335-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3252-113-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/3448-3601-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3563-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-40-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-18-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3597-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3594-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-496-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3049-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-97-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3591-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3588-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3553-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-3585-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-509-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-808-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-37-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-21-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-20-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4396-19-0x0000000000D31000-0x0000000000D5F000-memory.dmp

                              Filesize

                              184KB

                            • memory/4396-3581-0x0000000000D30000-0x00000000011E1000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4684-57-0x0000000000FD0000-0x000000000147D000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4684-58-0x0000000000FD0000-0x000000000147D000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/5300-504-0x0000000000E30000-0x00000000010E4000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5300-482-0x0000000000E30000-0x00000000010E4000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5300-480-0x0000000000E30000-0x00000000010E4000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5300-507-0x0000000000E30000-0x00000000010E4000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5300-481-0x0000000000E30000-0x00000000010E4000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/5308-3582-0x0000000000D80000-0x0000000000D92000-memory.dmp

                              Filesize

                              72KB

                            • memory/5308-3583-0x0000000073F80000-0x00000000740B4000-memory.dmp

                              Filesize

                              1.2MB