Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/11/2024, 07:10

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    e9032bd6b7f9a11522cedfca03475bd2

  • SHA1

    c40aaa57ea60cf8e59eab614e9964e8b918da330

  • SHA256

    ea138d7d66a019829246b7a005aeae4a983054dcc7f2785148a8891ecbee03f7

  • SHA512

    cd09ea873547c8481efe93b1c22d51c40ab29469d5184a56632b61811c596a5d042349c56473da86066b18c4068dc75cf2a1d3941ee0833f0b51115808f5fbd1

  • SSDEEP

    49152:a6FQLJIs5Yt1UfEjICgpaQ3/v+GHRRM3l:hqL0TSv+GxE

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\1008130001\5ae929a055.exe
        "C:\Users\Admin\AppData\Local\Temp\1008130001\5ae929a055.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3756
      • C:\Users\Admin\AppData\Local\Temp\1008131001\ea78463cf4.exe
        "C:\Users\Admin\AppData\Local\Temp\1008131001\ea78463cf4.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4732
      • C:\Users\Admin\AppData\Local\Temp\1008132001\df685185cc.exe
        "C:\Users\Admin\AppData\Local\Temp\1008132001\df685185cc.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2324
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM firefox.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1568
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM chrome.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4332
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM msedge.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2468
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM opera.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2108
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM brave.exe /T
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2912
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1608
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
            5⤵
            • Checks processor information in registry
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4008
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a13b2d7-707a-407e-a62a-572ec5a59c33} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" gpu
              6⤵
                PID:2812
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8854785d-f2b9-4b73-9c05-924f20677f3a} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" socket
                6⤵
                  PID:1320
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3052 -childID 1 -isForBrowser -prefsHandle 2832 -prefMapHandle 2912 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5010f4aa-eeb5-493b-a99e-df68ebc87ea9} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab
                  6⤵
                    PID:4512
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2592 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce6c432e-ed22-4a3d-962a-a60168e540be} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab
                    6⤵
                      PID:580
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4908 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4900 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0aacffc0-05c7-401c-bbe2-89a2eac94056} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" utility
                      6⤵
                      • Checks processor information in registry
                      PID:708
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5432 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e43d4d4f-2b45-4848-a030-90dc262a310b} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab
                      6⤵
                        PID:5640
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5564 -childID 4 -isForBrowser -prefsHandle 5572 -prefMapHandle 5576 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {276a6c06-3e65-466c-bd06-2803b7bd8859} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab
                        6⤵
                          PID:5652
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5756 -childID 5 -isForBrowser -prefsHandle 5764 -prefMapHandle 5768 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dec36b9-d051-400c-8b83-c6093db076a1} 4008 "\\.\pipe\gecko-crash-server-pipe.4008" tab
                          6⤵
                            PID:5664
                    • C:\Users\Admin\AppData\Local\Temp\1008133001\35316e6fe5.exe
                      "C:\Users\Admin\AppData\Local\Temp\1008133001\35316e6fe5.exe"
                      3⤵
                      • Modifies Windows Defender Real-time Protection settings
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Windows security modification
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:6012
                    • C:\Users\Admin\AppData\Local\Temp\1008134001\8f01ec0e49.exe
                      "C:\Users\Admin\AppData\Local\Temp\1008134001\8f01ec0e49.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Checks processor information in registry
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2304
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                        4⤵
                        • Uses browser remote debugging
                        • Enumerates system info in registry
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        PID:5840
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc05dacc40,0x7ffc05dacc4c,0x7ffc05dacc58
                          5⤵
                            PID:5856
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:2
                            5⤵
                              PID:5296
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1724,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1720 /prefetch:3
                              5⤵
                                PID:1728
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:8
                                5⤵
                                  PID:3464
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:2992
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3472
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3168,i,12983097968521070539,14722272346081708426,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4440 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:716
                              • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2904
                              • C:\Windows\SysWOW64\schtasks.exe
                                "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Scheduled Task/Job: Scheduled Task
                                PID:1768
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 1828
                                4⤵
                                • Program crash
                                PID:5140
                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                          1⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          PID:224
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:4532
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2304 -ip 2304
                            1⤵
                              PID:1692
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5536
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:5836

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json

                              Filesize

                              28KB

                              MD5

                              a83f74268926e7613a0e062e74d1c780

                              SHA1

                              a2083dca5ec5deb71c74c32b3779e39e8cbdc4d5

                              SHA256

                              3e154ce4d16b78585276ca0013c3d76c71a2478e0bb8c2f0242ffb19f77213ed

                              SHA512

                              91661d3c9346f0a2a1402715c656280fa7616e3d4d8a6d4057551d7a4a8ec3019dc4aaebbd38ea795b373937934a1e608045d6072126478b8b4749a048a77090

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              2a87c17d889a152b1118b866435c0df7

                              SHA1

                              e074ba6302a2d9547b94c7dbfa2c78b599ff02af

                              SHA256

                              0736fd24216fc6a68e57f84c2dfa219e5faba792ce081dd2a2bdd5e6c7e56ceb

                              SHA512

                              2fe90981c66703ff1f90e9eabfbd09ff833a2a35a2c0b425caf99a8897eb24a4741a71545342dfae3f289fd0d32eb6e649df1d9c853d48336713dee9f96c161a

                            • C:\Users\Admin\AppData\Local\Temp\1008130001\5ae929a055.exe

                              Filesize

                              1.8MB

                              MD5

                              d34f17d6aa0d5d4e1c9643a393638b80

                              SHA1

                              5aca7b99b7ab1d900c16fc28ff4be85afcbc1b54

                              SHA256

                              bd1bc09dba48d5eb9eefd72ba02d47c9bd2684192bcfe733e1faf177d5e1af2d

                              SHA512

                              fa4905b822b2341055cc7a93b833741b08c956b2a3fed9b35fd4d257dcd691f1068f25b269fe41c88fd56d33aec5bedebaeb833cff39c5de838f83ba94148b65

                            • C:\Users\Admin\AppData\Local\Temp\1008131001\ea78463cf4.exe

                              Filesize

                              1.7MB

                              MD5

                              6edefc0c895756e5e929668b5f804c1f

                              SHA1

                              37cc66db57185d2dd9827f2a5670fe527592d5d2

                              SHA256

                              4cda37f0fdd836cfebb3df05dc550fff54eab9f7a9959c083ce50d0f049aa0a0

                              SHA512

                              5f34e6de56f5d86d59ccbb966b1dbff64ef8b2a759bc9cfbadde40e05d6c2924940a6c63329f633d9464ac8ae35dc9ada419ad3436dc787a2b1bfbe7c120b13c

                            • C:\Users\Admin\AppData\Local\Temp\1008132001\df685185cc.exe

                              Filesize

                              901KB

                              MD5

                              781a0148b24f27699d9870c1c081a45f

                              SHA1

                              e890780bff30ccf6ea3045cbc92be601e18db9ed

                              SHA256

                              e9c8d89cf714460554b7612b59b588e9524635cfb5def3081f3ce430adaacb97

                              SHA512

                              c12d55698c1d22f5cf68facaa16e4b4f67e300406c2b0550ded6badc3c91dc96f0b237179b9e23ef96f51b44f0553bb902ebe740290e07decd3b8437df532ac8

                            • C:\Users\Admin\AppData\Local\Temp\1008133001\35316e6fe5.exe

                              Filesize

                              2.6MB

                              MD5

                              d4f5cffd064699c0e7cc6d22ef93ca47

                              SHA1

                              ade110656bee4db7f9a7a93be0789b976692ba76

                              SHA256

                              740550407f1a9199d252d17a72f4f755e8e55505e372ad0437e170762d8fa333

                              SHA512

                              fc2863f0fbc938922d4b56bc830ab4609cd6c3e5d272242d86d5cbd7eae76f17f332eb099193f4ea37a1567bc09c6e06515b5432c2b9b112678eb352b371a9dd

                            • C:\Users\Admin\AppData\Local\Temp\1008134001\8f01ec0e49.exe

                              Filesize

                              4.2MB

                              MD5

                              455d3e46c7b97c0e6f1ed1072e8ec7b1

                              SHA1

                              fa1bc295a7f78dce0c28bf9c24a7fe16e8b6bc55

                              SHA256

                              f5c02d06937793096e56f2acd5b302fe7cdcdfbdf943c9ee269b50037753969f

                              SHA512

                              ef0b87b68dc6bb80f41d64c94b3e0d1170f9e9e02eaa191748e12bf32c8efe63d94063667a4cc6ec3c72094288b873b9fcb109b1885551111f0e6b59fc01181d

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              1.8MB

                              MD5

                              e9032bd6b7f9a11522cedfca03475bd2

                              SHA1

                              c40aaa57ea60cf8e59eab614e9964e8b918da330

                              SHA256

                              ea138d7d66a019829246b7a005aeae4a983054dcc7f2785148a8891ecbee03f7

                              SHA512

                              cd09ea873547c8481efe93b1c22d51c40ab29469d5184a56632b61811c596a5d042349c56473da86066b18c4068dc75cf2a1d3941ee0833f0b51115808f5fbd1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              5b3b84be9e577845d8bd3635d29d0101

                              SHA1

                              4c1df715beb7b51083755b094e589bcaa43881f7

                              SHA256

                              a5e3abddbf6139589004c2f38fb319c2278a594f9f223a312bf01ec34b56e4b6

                              SHA512

                              4c03a10369e4fc714a993aedbf1bbe8ebd9526302ef506c13fbc30713a6563ea29a72063c68cb12cbbd51ba4346ea2e66a20acd5fa4a71ec5d5d8cebfb1a2841

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                              Filesize

                              6KB

                              MD5

                              c80655c68ab21bd2a955d0119e1e7dd6

                              SHA1

                              a815d77aa983a42ad59e72b3ab725a51d9fdbcc4

                              SHA256

                              5d0707bf768ee23b24d1b70324d040b25da7fb328cadb11b28e0e973eafa5553

                              SHA512

                              4eb18603ae800c15f7be67f67db2e8cefc234f698ff349b0c179061c614af9cdf151bde9e43a0f83795aa0221693909af014698558f3ed2047c5ec125df64339

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              4d220782374662819360cff0fec3a69b

                              SHA1

                              473b4c5538faef4a0303007188fce46066070764

                              SHA256

                              5821143a2f6330eeb11bbc4e221acb34b10cced2b3a258f25afe01b07462cfe3

                              SHA512

                              2f44d9a9caae756156cb900d465e4615dc48ac78338f4b19de2f3d5dd18cdfa0816e973bcbb93ba6aa07f6abaef919ced88d5578c1037575f64d3abf3d62e046

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              11406b83416c8df889f6efa6120dbe75

                              SHA1

                              c795b548235d1b983212e8999d6eea1807ca5ad1

                              SHA256

                              38af991e773604e3e4f553050560fd9e1b170ec470aec71ebb1fc289743696c5

                              SHA512

                              2677d7608784a7daeecb5e613730abf46c714fc89e81bd3a17b7dcaf51b84d3c68c5555be441a959c01c7509d8d8e83637a68316289c2bd18568a738827757b7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              e517a2eca0d20692bc259d1cd023d9bd

                              SHA1

                              0f85619a630afad26cd3f48e784da20b6fbc0d4d

                              SHA256

                              9c6dadd69f5cbb40acf3ddfb19a7997e6419374f5bbc023daaab8e1211498b05

                              SHA512

                              09af5ab4d987065d0955055b4ed44d4cca1226cdca2e705d8a3167f360d3778d5a70a2f8b41543985f17b101fe5bf25cc2671a1352087068d6bad7a49c955288

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              3060ad8f7db53eda6a4ba304930b098b

                              SHA1

                              679cd1c41160733c3b709472776df40f67898df8

                              SHA256

                              3a2e6a7cbecf015069ceb9977a52eda1b401fe722245624b65cc652a99b7cac6

                              SHA512

                              7428cd0b89ff4681359b1738b14866baba7248daaca2314304134129e46cbb1bc26f745a53bab3912cabc5f695400d8043dbaee6789a6eaa5c386fa4f03d2870

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\34c9f73e-49ec-424d-a3a3-2f7cd73ecc8c

                              Filesize

                              26KB

                              MD5

                              4b459682571a990ef0361b9b056a4a90

                              SHA1

                              409163d154b7e2dae4dc6bb6e6721e86ddbd9e41

                              SHA256

                              4ecfa6c6ce58d1817938ba7f766862dcf426671feaf966c3712c8a81e5ce5b16

                              SHA512

                              94fcd59953f5a0d665256a6de9f464a381392666687dd3dcb33c570153ab5c835ffd0f69ba41653698bbad95c1a6ae8b9560ec159a112bbe14328dbe9454feb3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\bb32e98d-7e22-434c-85bf-78a41be53222

                              Filesize

                              982B

                              MD5

                              91767ec08e8f80cb417f1a4c2155c142

                              SHA1

                              8d2300b4742e7116dc55c985689ffba9ecff8329

                              SHA256

                              0a0c7eed36b704c79984a46b16942e59e9bffdaa441101ada0ad354009d672d8

                              SHA512

                              52862cb485cfe9b3daed6ded569a946b6875a094568d60bbb24706e03871e95e560951990131e1e88aaa1c91a7eb43665f216008db9f0f70cea7dd9f431ef040

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f8d903fd-9ba9-4cf9-87f9-3023c03d2d3d

                              Filesize

                              671B

                              MD5

                              008163eeb14de535c2cf62cfe440bafb

                              SHA1

                              fc5392fc0b443b27e17c2962704dc74152aca134

                              SHA256

                              1e3661b09ca3ed3dd00720f2e03b286a3153e40f85239ac9576127d184abc811

                              SHA512

                              fe26f565f7336fcedb422b7a2608b34c29cd49e74b2e7f2e10e88c6c27e99eca801e36a78d3308103e2d2b5b2a9a398cef54802f9ef8d3ebc4dc82c2cea89c67

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              7e8f61c4201f44345b7d77c513e9add6

                              SHA1

                              8aa532346ec3f71b4e854689f232cd93a11b2858

                              SHA256

                              084ab2b55a6e4f62b30c5ad8da615d286ff1a51be270225ec748b746a70520d4

                              SHA512

                              dbb139705459ceeb6a7efe490c719605a44ddc555b6eef0c3bdd1e415261302dc71892b04b1024b2279f376f147da68dba7c4d612356fc2ee8a8db393ee5e1d0

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              326bd353343c65d34b75b21e6f169594

                              SHA1

                              bac6330f4e41f501aad38a415b03eae744deb2d8

                              SHA256

                              9eb7dfb172f51726d7b4ac86b27a8047c0a80c4bbb07acdf920d244649f95c12

                              SHA512

                              45eb326106780780e7bd01dc14780568f925cdddfc6b2f40226508f65c9bfe56a53a038250c7e61cba4eb602539e8a66ac0c3878ddb4ec2c9218c2a193e31f20

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                              Filesize

                              11KB

                              MD5

                              ac1fc4f0fc051b925338cb7b7e679a6d

                              SHA1

                              3e0a871c4c80f1710d05e66a0f20a2e7d10d5fe8

                              SHA256

                              98fc80ffdda93864703f84c56f84db86d12b199e9a75a5bd2fd8f37f726371ad

                              SHA512

                              4cd6ecdade972a1274cc66a80425ea7fd0ab9857b341df89899279bc1b2cab345dc02f9d4988ae4bfcf6bcbc44552da8cbc70a4adf3ccca64864d93f98e78f1b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              3.0MB

                              MD5

                              cc603649dacc283e7a9510ff9702dcbc

                              SHA1

                              65acb0ae8700f695465376d0c70d15b0a8902fbb

                              SHA256

                              d158d572e7d01f24744638a4c6ee5469ea78c2551c1d814bba7b3dbab4b3c26d

                              SHA512

                              450e906f9d268c85a7bd480a881c75894b7913887d8fd2b80fc113612d3db94492acaf5d0d70b06abdcb06281bd035c385948969e6e96e71f5e36dd71ec5d24b

                            • memory/224-1845-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2304-2926-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-2865-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-491-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-2906-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-774-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-2915-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-1902-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-473-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2304-2223-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/2304-490-0x00000000006B0000-0x000000000130F000-memory.dmp

                              Filesize

                              12.4MB

                            • memory/2760-60-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2927-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2953-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2945-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-451-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2942-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2933-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2930-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2705-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-19-0x0000000000C01000-0x0000000000C2F000-memory.dmp

                              Filesize

                              184KB

                            • memory/2760-489-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-18-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2913-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-730-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-40-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-38-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-2905-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-1771-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-21-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2760-20-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2904-2928-0x0000000000840000-0x0000000000852000-memory.dmp

                              Filesize

                              72KB

                            • memory/2904-2929-0x0000000073620000-0x0000000073754000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/3756-58-0x0000000000FF0000-0x0000000001483000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3756-37-0x0000000000FF0000-0x0000000001483000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/3756-39-0x0000000000FF1000-0x0000000001018000-memory.dmp

                              Filesize

                              156KB

                            • memory/4644-16-0x0000000000710000-0x0000000000BD1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4644-4-0x0000000000710000-0x0000000000BD1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4644-2-0x0000000000711000-0x000000000073F000-memory.dmp

                              Filesize

                              184KB

                            • memory/4644-3-0x0000000000710000-0x0000000000BD1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4644-1-0x00000000773F4000-0x00000000773F6000-memory.dmp

                              Filesize

                              8KB

                            • memory/4644-0-0x0000000000710000-0x0000000000BD1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4732-59-0x00000000003C0000-0x0000000000A44000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/4732-56-0x00000000003C0000-0x0000000000A44000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/5536-2936-0x0000000000C00000-0x00000000010C1000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/5836-2939-0x0000000000840000-0x0000000000852000-memory.dmp

                              Filesize

                              72KB

                            • memory/6012-400-0x0000000000270000-0x000000000051E000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6012-438-0x0000000000270000-0x000000000051E000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6012-436-0x0000000000270000-0x000000000051E000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6012-485-0x0000000000270000-0x000000000051E000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/6012-488-0x0000000000270000-0x000000000051E000-memory.dmp

                              Filesize

                              2.7MB