Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 09:11

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    5476d45e7197000fef76b5deaa75b05c

  • SHA1

    d96240afdbd6be6feb41fb7e02726242935d6b2a

  • SHA256

    206a13ffa82b73658c7c9821b6ed3d4774068ca5fd6ede9a8f4744d2ca527a62

  • SHA512

    25ca089f9cbc147356eb9f89bf74bdd2ce3df7112abde49a274ceabd8d3ead4aa2840fd8ba8310a1451341139550890691c73297f4835cdc35e97d9208620c62

  • SSDEEP

    49152:1jVttTqyIeIi5YFBWUvGn5j+ZIGgVgjE:1ZTc5i5YFBWUvGnQusQ

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:956
      • C:\Users\Admin\AppData\Local\Temp\1008152001\80c3ac1bd8.exe
        "C:\Users\Admin\AppData\Local\Temp\1008152001\80c3ac1bd8.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1872
      • C:\Users\Admin\AppData\Local\Temp\1008153001\6ff90ebd11.exe
        "C:\Users\Admin\AppData\Local\Temp\1008153001\6ff90ebd11.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3028
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe5844cc40,0x7ffe5844cc4c,0x7ffe5844cc58
            5⤵
              PID:376
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:2
              5⤵
                PID:384
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:3
                5⤵
                  PID:1556
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2232,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:8
                  5⤵
                    PID:3096
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1580
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4392
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4528,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4616 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4228
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4776,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4784 /prefetch:8
                    5⤵
                      PID:4220
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,13373487573858369374,5571432799852091358,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4788 /prefetch:8
                      5⤵
                        PID:4708
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 1520
                      4⤵
                      • Program crash
                      PID:5308
                  • C:\Users\Admin\AppData\Local\Temp\1008154001\9957117f77.exe
                    "C:\Users\Admin\AppData\Local\Temp\1008154001\9957117f77.exe"
                    3⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1240
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM firefox.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3160
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM chrome.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4592
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM msedge.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1484
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM opera.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2732
                    • C:\Windows\SysWOW64\taskkill.exe
                      taskkill /F /IM brave.exe /T
                      4⤵
                      • System Location Discovery: System Language Discovery
                      • Kills process with taskkill
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5048
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                      4⤵
                        PID:1388
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                          5⤵
                          • Checks processor information in registry
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          PID:512
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1796 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {964d9400-b31a-4de3-9343-acbadba4c2a0} 512 "\\.\pipe\gecko-crash-server-pipe.512" gpu
                            6⤵
                              PID:4364
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebdb212d-ec73-4f0c-876c-0aa539b1faf6} 512 "\\.\pipe\gecko-crash-server-pipe.512" socket
                              6⤵
                                PID:3732
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3100 -childID 1 -isForBrowser -prefsHandle 3180 -prefMapHandle 1388 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {44cf88bd-3773-4ad5-af1b-513796a9669a} 512 "\\.\pipe\gecko-crash-server-pipe.512" tab
                                6⤵
                                  PID:1436
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 1140 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02e87e76-2402-4f6d-9862-f8740c8877b1} 512 "\\.\pipe\gecko-crash-server-pipe.512" tab
                                  6⤵
                                    PID:3124
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4724 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71362360-0e23-41f3-8ec2-cbc6fda1bc7c} 512 "\\.\pipe\gecko-crash-server-pipe.512" utility
                                    6⤵
                                    • Checks processor information in registry
                                    PID:5324
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5384 -prefMapHandle 5340 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {33ae8e02-c5e6-4013-a31f-d84a7f15c749} 512 "\\.\pipe\gecko-crash-server-pipe.512" tab
                                    6⤵
                                      PID:6040
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5540 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a364de77-574b-402e-b394-3b490e89bef7} 512 "\\.\pipe\gecko-crash-server-pipe.512" tab
                                      6⤵
                                        PID:6052
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 5 -isForBrowser -prefsHandle 5720 -prefMapHandle 5724 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67677837-5e43-4779-a3fc-af28b73b48e5} 512 "\\.\pipe\gecko-crash-server-pipe.512" tab
                                        6⤵
                                          PID:6068
                                  • C:\Users\Admin\AppData\Local\Temp\1008155001\ea52649129.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008155001\ea52649129.exe"
                                    3⤵
                                    • Modifies Windows Defender Real-time Protection settings
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Windows security modification
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1520
                                  • C:\Users\Admin\AppData\Local\Temp\1008156001\e447d0e728.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1008156001\e447d0e728.exe"
                                    3⤵
                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                    • Checks BIOS information in registry
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Identifies Wine through registry keys
                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                    • System Location Discovery: System Language Discovery
                                    • Checks processor information in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5580
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                                      4⤵
                                      • Uses browser remote debugging
                                      • Enumerates system info in registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3220
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe58f6cc40,0x7ffe58f6cc4c,0x7ffe58f6cc58
                                        5⤵
                                          PID:2888
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:2
                                          5⤵
                                            PID:2452
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2036,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2052 /prefetch:3
                                            5⤵
                                              PID:3908
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:8
                                              5⤵
                                                PID:4508
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3212,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:844
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3240,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3356 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:3456
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4344,i,7077914775222176252,9548377267567914466,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1
                                                5⤵
                                                • Uses browser remote debugging
                                                PID:5312
                                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                              "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:4764
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:5296
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5580 -s 1052
                                              4⤵
                                              • Program crash
                                              PID:3068
                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                        1⤵
                                          PID:1484
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                          1⤵
                                            PID:3508
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2272 -ip 2272
                                            1⤵
                                              PID:5276
                                            • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                              1⤵
                                                PID:4284
                                              • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2452
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 5580 -ip 5580
                                                1⤵
                                                  PID:5992
                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3572
                                                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                  C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                  1⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:2816

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  40B

                                                  MD5

                                                  6adcd808d1a2a6f9ebac5f805cd220cf

                                                  SHA1

                                                  0f0e1fea371ce8cbc6cf270c6863f9dcd546e4e5

                                                  SHA256

                                                  3bed64a9bfe94bc32d7519e6ab1132f4bba27029407c0d710aea073b92b4eb26

                                                  SHA512

                                                  bb11c7df6fcd3f7a66c3a5c9445084e386e0db6579c5d2b4480f6381e8f41b945279e4c9b2753c134834e5c25663ad6368b3af41ca9a018d7713fd184cafc48d

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                                  Filesize

                                                  44KB

                                                  MD5

                                                  36f9d1b0eecaeb138463a1fa17253a1e

                                                  SHA1

                                                  fbf8771422576f1cfba864de0a1091383fcc684e

                                                  SHA256

                                                  34bae122441079420d52038cdb270e39049fe45bc0f0d8f3e8407276f306c8ec

                                                  SHA512

                                                  692f95422e4c02b9037fb7e00aaf6d7672690ab8e62e695524b979baaf61f2db6016cacb3e1d1888799a2fbce64b66a3a949cf218a96cd97d301651d5db6701a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  62e2f0ad915de5cfbed8655c82cc7197

                                                  SHA1

                                                  288d018cdd6d6bdb57d23e56eb51ce7d13407119

                                                  SHA256

                                                  eac1dffbc7cf02ba4bf3b3e1e077b472710e4e1906d0da23eae766bb119ff3e3

                                                  SHA512

                                                  567c8c0609dc56e75ec42da6de3e3657456fac0114da543b77ded0686ec7da27e5e84929988423ddeb285e3429125b46c374ff37647920fb2e2b35bdc4812e85

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                                  Filesize

                                                  4.0MB

                                                  MD5

                                                  0d614cd46db7e4defd220031e4bfa23a

                                                  SHA1

                                                  7bd69e452e17b016d7c651e4e4888c16818705fc

                                                  SHA256

                                                  7c5e4e5fc47c2820a783aba0d684a2ba89210eb3bdc32bd1af4e776219b3da2b

                                                  SHA512

                                                  70270a742aad7fe170579ddd7663f4992c81fbda90283be6288edad705762af9451baad5d4f325e441c1ec7d4548efef8e00e88cbecbfaa5b4d302f5ce41fbb3

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                                  Filesize

                                                  317B

                                                  MD5

                                                  8deedb9eb1610bdd86d776372e5632c0

                                                  SHA1

                                                  fc26025a7c52a85e34b71caaa3b32a0686acff2b

                                                  SHA256

                                                  979b0fe19b35dc1e5a9da74ccb02f24992285fe772db99ab5bc9362a0c5785bc

                                                  SHA512

                                                  02aa27b087099677d5f33f0a55445522ab545314d7f465b619ccdcf4fded47b27bfa01d7f9c0d3f76da3093dd4551301dffd33dddb983672068e1165de8002f0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                                  Filesize

                                                  44KB

                                                  MD5

                                                  c9c76734ddba58c666feec5358389402

                                                  SHA1

                                                  b7aa3f1f1a715bdb422c1d4a0d921f8a3a2ad1a2

                                                  SHA256

                                                  1bd54d65d148313b2ed490c7f83f3cbff49a64a6f6d163d7bae56ffea56d6017

                                                  SHA512

                                                  625bcb2434b0684e6763599e442ea7836191505c49e8684f6f236c4be34e83a8c12421ef64286781d3be73648478f60895d8a6bee9eb1dc40dd17e031233e0aa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  8d72273be6e8f2c66999faf9d7c44186

                                                  SHA1

                                                  04a605d9c2c10338277ca5b9cb5b80fb60d9af59

                                                  SHA256

                                                  b43010ed9ff0d847d9cced85b2c82d78c7a9f76c82728c4df5fc1de3b466cce7

                                                  SHA512

                                                  4b34324b6952157801073dd301644e875e767a8b858d118866f0d1bb332823fa792a72f76cd9510ec6be35807411e696e63e900ecb0d7f70b5bbc1de091d64f8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                                  Filesize

                                                  1.0MB

                                                  MD5

                                                  fe993339a25710ebec86c051941d462c

                                                  SHA1

                                                  1a7a578b7a32bbe2102a789c2321090d406838d1

                                                  SHA256

                                                  59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                                  SHA512

                                                  b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                                  Filesize

                                                  4.0MB

                                                  MD5

                                                  d6b0609c4b6edb45553ff9afbfc95e33

                                                  SHA1

                                                  2697657b75906d3653f48080ec1f3993c07bd8bf

                                                  SHA256

                                                  eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                                  SHA512

                                                  db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                  Filesize

                                                  329B

                                                  MD5

                                                  db29811ed0f1add493d711f34a148ba1

                                                  SHA1

                                                  b1ddb439dea841226039c1c4c51bfd9e8bf23670

                                                  SHA256

                                                  751fe4871c921a34631ca7f0960f3213c4ad5bba3ee63c5474ef9ebf0a2847d9

                                                  SHA512

                                                  9f313a7cff24f07df9b1da0299a860fe128eed354490d8b1e39ebc362a2d15dd2d83983178374728cac8311d5559fa6db9632f0c10b2c2d3f1136c50271edaee

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                  Filesize

                                                  2B

                                                  MD5

                                                  d751713988987e9331980363e24189ce

                                                  SHA1

                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                  SHA256

                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                  SHA512

                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                  Filesize

                                                  356B

                                                  MD5

                                                  c0048b97e1103b86cd22f2a4490b9921

                                                  SHA1

                                                  6fc3abb071072f99021b82cebe91805fe2536d0f

                                                  SHA256

                                                  d00daa57489f4dc1893ff87444f55137ddf41c2b760905a86d5adb8850fd0289

                                                  SHA512

                                                  1cb1141f574c252b9c7010781df1490f957ed4f0f5ea556abf1ffcc94d878b6d4e428b805b4633cd666d059a9b6522e32ddf586580aaeebff7bdc252c9c4ddc1

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                                  Filesize

                                                  333B

                                                  MD5

                                                  7d88125154ad7b5fe8a26fb30ce5dc31

                                                  SHA1

                                                  d92c196c0d085f1f5437df61ba0b696e32b326e5

                                                  SHA256

                                                  01ae8f58c82e13fb940b0ebfb1e4b73e34e3507555ea187c60ce1ebef78c2d25

                                                  SHA512

                                                  ad05764dc53cc4175d9b87b6253ba5f85d0ea2f80cf5180b18af9c985c2b3a772272a1b0edece4b0633c176a630ba04ea3d31f63e6ecf0f2ba3d00e4a2e032dd

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                                  Filesize

                                                  289B

                                                  MD5

                                                  541c42f1c98b3e1b011d22eba854e707

                                                  SHA1

                                                  db30188de1f22e3077e7044be1386a5d0ecaed9d

                                                  SHA256

                                                  0768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b

                                                  SHA512

                                                  47828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                                  Filesize

                                                  317B

                                                  MD5

                                                  7dace245f67c81e6999bdd737a59148c

                                                  SHA1

                                                  1f65fc6ebebeb688f5fe63667118585bb1ba23ed

                                                  SHA256

                                                  221dbc76f0be4f6137861edcd1158c84410339ba318385f74f851bf354190b2c

                                                  SHA512

                                                  3bd4a5f20cbd803ab053de9655d6e4f5b567d1b7a6c90d39bda3e74d964718f9f957d4f571fa2e303ab89f57eacf91ab9a21bc16591df1de97cd55c97ce908e5

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                  Filesize

                                                  348B

                                                  MD5

                                                  da4445327a53ce1641c944d93c063bd6

                                                  SHA1

                                                  21da3f718dc33cfa65bd3fae6f9025d285e51706

                                                  SHA256

                                                  f764d2e2640e28f42477efd638dac5e1e8fc1a3bbe5b0201c95a0dda802149a8

                                                  SHA512

                                                  97cb65943cea57ce10d93b0a06fee735cea37f743b1c04a8121b88afa279d30db09d6e4704b038c25e90d052dad31fa98b897f5cb463e18adca48fade092654a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  321B

                                                  MD5

                                                  9f0bc6bf2af9732cf6c179d30137bc2e

                                                  SHA1

                                                  a3ed1c124a6363aaa17792a501f98671e9e3d771

                                                  SHA256

                                                  db05f1fdd0b476828ff573ea06293a668094187ef3bd8abb629ec25c0b48dacc

                                                  SHA512

                                                  23d01802ff72f19454fbfc0f2bdf6e9ea0fc03b3d8ea52cb97c050fd9ed4e1e42fbd0f447d6879f76bd077495b1f688dfbf79ff666098d9f33cb9e19eb6976ad

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  67c227e16ea78adf588ebb3032721365

                                                  SHA1

                                                  0e38ad62617d2789b16c736d9f3998b9c23b3d77

                                                  SHA256

                                                  48bc14ec5db3dfe2fcf923bc658a3be95d5ed6c9984f51e3248868124e9f7886

                                                  SHA512

                                                  d64dd82d18fffd4285d3ea4b8f04793deaaef19f8b1c08499b0ac4bf21a0f8e40a3999a44bc0da9f854106e778341425246832d0d39e4bfe5a4991a4defb35ca

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                                  Filesize

                                                  14KB

                                                  MD5

                                                  db49695f4b2bc993a868723f94f02028

                                                  SHA1

                                                  55897e8fd14c9c032407762991b9992a5ce67745

                                                  SHA256

                                                  2258491de540010d36cc2b1acaf4655eb3bfe5a75a08e3066467a16155d882ea

                                                  SHA512

                                                  ff65fd01ca19bc09bfec43b9dbcac43afb6a2b60056cdc6b033052c1c6fc000b5aba277e12eb56b24431d9142102ae14e1061855ab26347dbfc70dd07329dc1c

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                  Filesize

                                                  320B

                                                  MD5

                                                  30e87c50acba1b470936881b8a4791bf

                                                  SHA1

                                                  24b981314c0907429604edd11eb6f4c77a3786d2

                                                  SHA256

                                                  7d1bcd79a102f496fa8982f9c1aac5fa22469283f4c7fcf8e9e402d0698c41ba

                                                  SHA512

                                                  48ddc1816c62a51c1c9f6fd9006231ac619041f945b1b3bba484c12353f1692fa51c13590c2f93c00f7cf87280b0d11ea4399f77ebc004377bda426abc56baee

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  0e33b3ba1e8998a0580581d0b88200fc

                                                  SHA1

                                                  eea93b53373ce4d5f925ed093117593d635c96d5

                                                  SHA256

                                                  914e2c73ae6d1976fb54d7cc00e144c4134107f8a58a5e61d8c6f5a4c5d78e4b

                                                  SHA512

                                                  0dcecd597ca35902d596fd8c9d9f6da67ae2ff96a7b807d8711c826b513e7cbad3807c674bc029daff6637792f6ad2901b40943e9b798d7a04ad510e3b1ac1b4

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                  Filesize

                                                  338B

                                                  MD5

                                                  7d674387ecdb61f92e7ea4c7c3261dfa

                                                  SHA1

                                                  7702b6d99d262d0ebafefcc219ab6c50cfe23f7d

                                                  SHA256

                                                  3673162fcea1ebf8b574ac0b1068e60b65f332093c2b1f22f71e3c5b28c8728f

                                                  SHA512

                                                  b40921f4c3988305593c41ae16c84b32553cac7667bb5329bebf3380eb5874750cda159307e639e0515b1aa0992fe8d297c4cac297fc8e600e2678a5ee582a73

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                                  Filesize

                                                  44KB

                                                  MD5

                                                  f38b38ad8482d38b69cb9b42ffeb2a8c

                                                  SHA1

                                                  a54d6b15d8c2ebb0999e1fa2e3a6e1b670c15533

                                                  SHA256

                                                  53583108cbf0245393d29fbda8d21c3ea9d544f2fa515a77e2b7203c93e7eec8

                                                  SHA512

                                                  dab4cd936cb0d8f861c3ee08bb3359db3f62e3ae4ba1a90caf276ef6bcd95757a587a115be218390f660a4563f3a0ee573a3b067d74d3c0c9bed5604adf90e0a

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  5649f951ff5da36233806ed978403fa2

                                                  SHA1

                                                  98d102f7faa5589e95d2b547687ca987f33a80d0

                                                  SHA256

                                                  a2dec41aa9e8499b642cd6cf3488cc52d3ade522ac7ab712c37a1c45c9c02321

                                                  SHA512

                                                  12c47fd03bb51f8a2990228850474acb6fd1109c61eea06cf241085a62646bfc192634dd9612c54b1fc258d6024faa8aa90000e4087e6d6f478d5556629aefd6

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                                  Filesize

                                                  4.0MB

                                                  MD5

                                                  e39f95ae48a87705c07abeae9503e503

                                                  SHA1

                                                  7780349ff35b9620ac9cfbcf777e193c57b12802

                                                  SHA256

                                                  509e3fcd7404238039ff0030133c191fbd2fe48cf8e7295a796b18cc958b2d75

                                                  SHA512

                                                  9e91d63ee8b4812e0c59572cff2b7e88f0f816de5b5a36201ca39c633ef8a019af4f0ec456c545ed4614b82f84e6e16d160337be9fede0b5865a1152d2b7cfeb

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                  Filesize

                                                  14B

                                                  MD5

                                                  ef48733031b712ca7027624fff3ab208

                                                  SHA1

                                                  da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                                  SHA256

                                                  c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                                  SHA512

                                                  ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                  Filesize

                                                  86B

                                                  MD5

                                                  f732dbed9289177d15e236d0f8f2ddd3

                                                  SHA1

                                                  53f822af51b014bc3d4b575865d9c3ef0e4debde

                                                  SHA256

                                                  2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                                  SHA512

                                                  b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json

                                                  Filesize

                                                  25KB

                                                  MD5

                                                  42031dfb9cfec9a07a748dde92d8b8da

                                                  SHA1

                                                  48280f68add4b5d442ca3214422e6e22d6fb790d

                                                  SHA256

                                                  18c5309a26627fa2dd34dfa0ea68b25c47390a9b0daf95513e819775b7d88ef4

                                                  SHA512

                                                  5033d7961d96f56f03a57caf8aa9af9875bbc7f513e6ec70099392de0899d56d6763d787a7078f0fbb122eefe8c876063c8e56f23033dae4b9828404534f6771

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                                  Filesize

                                                  13KB

                                                  MD5

                                                  866ec9ce8a66aee34e841fe4f71d97a2

                                                  SHA1

                                                  ad0c51d8708168ff0a0adc649e36209d530d954e

                                                  SHA256

                                                  23fb89c9c355c1952b342251556f94012d29d03080ec03df3699ca7afe58592c

                                                  SHA512

                                                  1ba9d8a0a1c067e61f654e928564f4ba8894c0eb69d269e1ddf09b0255af26274f926dd0e587fde9b6c4f3916582aa6f9be3c05ffd12bcd17b287f3ff3c52e92

                                                • C:\Users\Admin\AppData\Local\Temp\1008152001\80c3ac1bd8.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  89ac374183f82ab1e8b6ad0dcf344f38

                                                  SHA1

                                                  1b78c4d8a8fd07d33e7256bca9d612aa00eb2994

                                                  SHA256

                                                  7607264e51d2f2fa61e5585f6d3cb9110b494b95a0e22421238bc869a0e9780f

                                                  SHA512

                                                  ffd09ed15b86fc8cc1019dd36df84c86411c5bbf359fca22842f1bfc0df10e1e56c0f9577bbc52d7ee4cd989bd6a343c02dc6e8e0a82abf4104d7c2cd491141d

                                                • C:\Users\Admin\AppData\Local\Temp\1008153001\6ff90ebd11.exe

                                                  Filesize

                                                  1.7MB

                                                  MD5

                                                  7c6cebc0b67c34551c68561c303a61dd

                                                  SHA1

                                                  47a98a783ee3a0c9d02e6d621171512888b9c4a6

                                                  SHA256

                                                  ab1cde35822418fb9a920ac806450588394245dd16669171e01bfa630459355b

                                                  SHA512

                                                  51d949f7ebbcd7e63268c84c248cb43f6e78c025faeca0c48482534f9828f21b1afbf455c6bbf433aec8b027083910a4fb39f05c247ca61b11225dfc2f42d3e4

                                                • C:\Users\Admin\AppData\Local\Temp\1008154001\9957117f77.exe

                                                  Filesize

                                                  900KB

                                                  MD5

                                                  4a7f785185e0ce8e5095f31b27da8be5

                                                  SHA1

                                                  fdf5b29dc9a1129a36d188c0b06e28c6db8d538a

                                                  SHA256

                                                  91df06a9c05880336013d88a0ee6d0e79ce3ce2ca6c7e020cc65c0b0a5db1e18

                                                  SHA512

                                                  4d30598c4aba12adaa1385570054d6a8ba5967df06fa07e9512b1dad1e1bf3a2100ddfbe6c65c85bd881533a76feaf05ca0a8285f094d6bbdf0084ffe03b55b2

                                                • C:\Users\Admin\AppData\Local\Temp\1008155001\ea52649129.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  c6feccd4f0b990efd374fb1d2a82c2ca

                                                  SHA1

                                                  db932fc437626d99156b62ee8b6218c12a0e5597

                                                  SHA256

                                                  72c429351b80805e44959570c33a49f69d5003448eb1e35a08e1a1fdc6363c02

                                                  SHA512

                                                  4f1081905fafaab050dca38a41a23ce96c80e2328e4f01a1dd39c1d2d8d972c452d131fb0df48c3548e5dbac930198f3bbf1b29ee9b37097477a834671844641

                                                • C:\Users\Admin\AppData\Local\Temp\1008156001\e447d0e728.exe

                                                  Filesize

                                                  4.2MB

                                                  MD5

                                                  78623a8cad0667f07764baa1c77adc20

                                                  SHA1

                                                  c7887f807d381380279ad131b5828262cff4265e

                                                  SHA256

                                                  16df14cdea17907bbeecb8c9f43486fc7edd4f23093b4043d11d6715921daea2

                                                  SHA512

                                                  0e960fd601a9a4e8814c4c5b37bb069a2f1e0f3862f5dc24ee4a29a641b34fab3ce4994648995890db0586fc244644feb229e805004af990a0a3a1efac85fde9

                                                • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  5476d45e7197000fef76b5deaa75b05c

                                                  SHA1

                                                  d96240afdbd6be6feb41fb7e02726242935d6b2a

                                                  SHA256

                                                  206a13ffa82b73658c7c9821b6ed3d4774068ca5fd6ede9a8f4744d2ca527a62

                                                  SHA512

                                                  25ca089f9cbc147356eb9f89bf74bdd2ce3df7112abde49a274ceabd8d3ead4aa2840fd8ba8310a1451341139550890691c73297f4835cdc35e97d9208620c62

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  479KB

                                                  MD5

                                                  09372174e83dbbf696ee732fd2e875bb

                                                  SHA1

                                                  ba360186ba650a769f9303f48b7200fb5eaccee1

                                                  SHA256

                                                  c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                  SHA512

                                                  b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  13.8MB

                                                  MD5

                                                  0a8747a2ac9ac08ae9508f36c6d75692

                                                  SHA1

                                                  b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                  SHA256

                                                  32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                  SHA512

                                                  59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  7f4916934c47510fe7b36833689857f3

                                                  SHA1

                                                  345a81e6f2a72b50e6dbfbed73e179f2bed06937

                                                  SHA256

                                                  b91c00198e6947fafe63000d913895e5bdf351762cb3d56e7a8630998d1669bb

                                                  SHA512

                                                  a00628175bbb128ff37b472dc9cc86eaea4d3fbe072ef5abf0c2e8ac9c64ce35dd9dd34d96ef8cba031dc0cbd42629def0e4dc41b7bb746e9c7af4cf194fbc1f

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  5KB

                                                  MD5

                                                  faef896ad2ae793d7a9305279ec71a7e

                                                  SHA1

                                                  89a0a56a48daae546fbb4203b906ef1b10306f0f

                                                  SHA256

                                                  7a3fe2c3761349759ce4358d968dd4010bb65e487065f6d683d6302de4a964d4

                                                  SHA512

                                                  40ea572d7f82db32ea0be1626659127c374671bb3bfb8fa8ca5eb3aa673925ba29836e42e84ebc6f27a9f79bbaf4ed366c82c806b4bc8fbf1e6a919d6a99c103

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  23accee779b981366775d3405320bf8b

                                                  SHA1

                                                  a8b500f0b6d27d1e9280fa21d7b9c99eef5fd9ba

                                                  SHA256

                                                  54b05ca956ce6dc091d36a7f06b3df252162508809e79aed2dc90f4103d2d5e2

                                                  SHA512

                                                  59aef01e7996e923638dc0c33992711e494f5e7755c516df1c31d2011f332115fd4b61ee3d092324fb86d380fed5c694a33255d888006d17b52d368713a3c545

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  7f821dd6ec922f580d0e6c0aeb43e536

                                                  SHA1

                                                  cace184520bceeca149a27df0329e904c08f0b9b

                                                  SHA256

                                                  10a080bf08ac6f567ad04fb1ef25a9358a220dd91aad2196f8be268ccb75e67e

                                                  SHA512

                                                  d1d39d0eaed9fc894438da814bc4c75de272756f0456797f59d04d5679353e41da5dc748b36d6c157c8c15c42085f1bef53694d7ed6f86a41d644536bb1bd557

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  d1e717080a394d425a7b648f02113f2a

                                                  SHA1

                                                  9cf53f28902164732d8b73d46a5da7b89f270d18

                                                  SHA256

                                                  046512a99b893668cebff2ffc5789c56b050012a58052e2570e0c3f5e99fb9c1

                                                  SHA512

                                                  179dbd0ecb4e40209ed1d08280ace4b68772a5b91e6a98826306b6ae0122b20c3b5e7fa108f6d5642ecef20f5af3695dcd9f4eafc455bf23afa03313a88f5233

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\473c18d9-82ab-4ba0-a8ab-c3d2e61eb52e

                                                  Filesize

                                                  982B

                                                  MD5

                                                  c4657eecdc61a37aa7ce8ac5220d27d9

                                                  SHA1

                                                  304f62142d96abad7356dbae7e1a15aa3770745d

                                                  SHA256

                                                  6b22dbb3fa79b516ff9a2c10e1e15072df95c62b4e8f46e6791c3eaead608dba

                                                  SHA512

                                                  8c53a8006db53bd6481c35d38914470ab7116072948b110a3a0c8d2b9dab22b2fd73445d9a26b2fa0cc3d55820d1c9b92adbf65b49cd4a362c7576b44f238d8b

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\80bb98df-d872-4141-b37c-edc7804de5ff

                                                  Filesize

                                                  26KB

                                                  MD5

                                                  2bce1696959b781b64dc19716cb580ff

                                                  SHA1

                                                  ec7090ef1939c7931e8a2409235d5545bbdaf04b

                                                  SHA256

                                                  67eba3bb1f35c3576b95a3e8b22e4aa75b43f4258e427a07db5080283563981f

                                                  SHA512

                                                  1ccfc19d3230b8b41917c8939d6fb8a4c3cb878f52c3ae09c901c1060bdc02263af6986d5510324c5882ec1361a17c57b6d1265f1d3beebe99381adf87496e67

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\e31ef0d1-f0b9-4b74-b762-bc0152dbb123

                                                  Filesize

                                                  671B

                                                  MD5

                                                  eaa686cb09ea366fa88dbd6b2f09e2a2

                                                  SHA1

                                                  56e7cee49bb56ad9789349c0b6257b87f105549a

                                                  SHA256

                                                  f8012c634d513f7dbc48359d6bef9af6b72a94040c48f1242a6c180a846380cd

                                                  SHA512

                                                  5f5d378135609f4e137a75be8e3f267d3d2791a469ec66bda1b3a0c2079baac48c8b2b5c0033021d446458634044a3bbd7890fabff4eacfff389ebba0b324976

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                  Filesize

                                                  1.1MB

                                                  MD5

                                                  842039753bf41fa5e11b3a1383061a87

                                                  SHA1

                                                  3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                  SHA256

                                                  d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                  SHA512

                                                  d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  2a461e9eb87fd1955cea740a3444ee7a

                                                  SHA1

                                                  b10755914c713f5a4677494dbe8a686ed458c3c5

                                                  SHA256

                                                  4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                  SHA512

                                                  34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  bf957ad58b55f64219ab3f793e374316

                                                  SHA1

                                                  a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                  SHA256

                                                  bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                  SHA512

                                                  79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                  Filesize

                                                  17.8MB

                                                  MD5

                                                  daf7ef3acccab478aaa7d6dc1c60f865

                                                  SHA1

                                                  f8246162b97ce4a945feced27b6ea114366ff2ad

                                                  SHA256

                                                  bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                  SHA512

                                                  5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  cd5f66539b1e2489b27d7051d1c71403

                                                  SHA1

                                                  8bd41ed1ba4c78499e06414ec06b5f01ae8c1614

                                                  SHA256

                                                  a3bf006d02c5bb51a4c89f14df6c349f447eb3625638ec6d42f189df27323465

                                                  SHA512

                                                  4c9bab53018b0d553ecee13fe17fdd4c058934a5b5921529af00d2c68a5337d3158d6023682fca66259daa5d611249d157d7ed0b9f4e35615851bc5895811cd8

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  12KB

                                                  MD5

                                                  b4ecce026471181bbc83031caf6a7ec5

                                                  SHA1

                                                  06c0511345803af9f5d2e1590d928a3bb15540af

                                                  SHA256

                                                  506bb0d51abdc03832cd3b64d47928004577409db8a58595794cd1e26706dc52

                                                  SHA512

                                                  11083873797c2cbde56469c6173eab5472953173c256aac3fcf693756dc0466667181359fa66197e3206d85e279f0563d1e8db947e4f6ee875cfeff8878d867f

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs-1.js

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  738600c48b575f55600ae3f7b596893c

                                                  SHA1

                                                  568b74f0d8673ad4190abf576a189e247b7a6163

                                                  SHA256

                                                  c53a36e3d59b46dbbb8420a11f6bb375d68549a8cc0fd897ed87aed28c6dd15d

                                                  SHA512

                                                  1d1a240107c63967b2c5735681d8823070775e5e31c93f74dab1d3fcc93ad9e27f525f222f3faac5dc4ebb9faa988f87419e29ee55b9022052d12b49396e6233

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  748bc590271299a049b099b39fd5874f

                                                  SHA1

                                                  8e7aa0c0590a228e6852573bf8d05d0cc116cf95

                                                  SHA256

                                                  9343de967549dde6750de0ce46dc7815bc65333b30f68981a17eeb2b5e0da753

                                                  SHA512

                                                  49fc517ff2da704fff8e158cf27699a491ce88bce40744655b06757d1b7da7b504359d61db0c5f9ca839594821343e6e45376227820f9b34f885535d751c40bc

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\prefs.js

                                                  Filesize

                                                  10KB

                                                  MD5

                                                  8048565a5194934e4d0ba13c63e21e33

                                                  SHA1

                                                  0cc5aaf66a3da808cae257bd16684b0d76d592e8

                                                  SHA256

                                                  e4b55ad6faaf9dee47537033a2d4d73847d845a62f142463db9d9fbaeca03c79

                                                  SHA512

                                                  e3438a7229e3813e975289116a5a04c657baffa621c6e3f3ab47d9d1eeaf9e510086d8542b4b8816060624a74c39dd7d14450d1d581c02ff329ab98bed135da8

                                                • memory/956-39-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-3980-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4022-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4019-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4016-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4007-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4004-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-473-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-4001-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-3997-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-655-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-3976-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-2083-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-537-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-16-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-19-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-60-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-20-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/956-41-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/1520-541-0x0000000000410000-0x00000000006D2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/1520-536-0x0000000000410000-0x00000000006D2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/1520-499-0x0000000000410000-0x00000000006D2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/1520-501-0x0000000000410000-0x00000000006D2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/1520-500-0x0000000000410000-0x00000000006D2000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/1872-40-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1872-38-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1872-37-0x0000000000FA1000-0x0000000000FC8000-memory.dmp

                                                  Filesize

                                                  156KB

                                                • memory/1872-36-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1872-59-0x0000000000FA0000-0x0000000001443000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2272-61-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/2272-396-0x0000000000680000-0x0000000000D22000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2272-397-0x0000000000680000-0x0000000000D22000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2272-56-0x0000000000680000-0x0000000000D22000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2272-502-0x0000000000680000-0x0000000000D22000-memory.dmp

                                                  Filesize

                                                  6.6MB

                                                • memory/2452-2452-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2452-2382-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2816-4015-0x00000000003F0000-0x0000000000402000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/2972-1-0x0000000076F64000-0x0000000076F66000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/2972-18-0x00000000009D0000-0x0000000000E83000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2972-0-0x00000000009D0000-0x0000000000E83000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2972-4-0x00000000009D0000-0x0000000000E83000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/2972-2-0x00000000009D1000-0x00000000009FF000-memory.dmp

                                                  Filesize

                                                  184KB

                                                • memory/2972-3-0x00000000009D0000-0x0000000000E83000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3572-4012-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/3572-4011-0x0000000000820000-0x0000000000CD3000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4764-3998-0x00000000003F0000-0x0000000000402000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/4764-3999-0x00000000731A0000-0x00000000732D4000-memory.dmp

                                                  Filesize

                                                  1.2MB

                                                • memory/5580-542-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-1221-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-529-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-3993-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-3979-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-3647-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB

                                                • memory/5580-548-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                  Filesize

                                                  10.4MB

                                                • memory/5580-543-0x0000000000BD0000-0x0000000001817000-memory.dmp

                                                  Filesize

                                                  12.3MB