Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 22:45

General

  • Target

    099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe

  • Size

    3.1MB

  • MD5

    035d4f0c02471d8611df2f1749ce4ed0

  • SHA1

    95604864ead15d71306fb081d7b5dc5652999653

  • SHA256

    099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8ade

  • SHA512

    125651e8e9b0c3527e3e59672f57c5b266a6ecbcfee682a372c541339944787564305abeba4f805213105c9416c37fbc5b54a6afbac98ec6908bbb40292d997e

  • SSDEEP

    49152:F1uPRkNVR57XB1qkc/KfmC+GaOVWg1yl+KjOEZD:mPYVR57B1qksBC+GaOVlk+Kym

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe
    "C:\Users\Admin\AppData\Local\Temp\099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8adeN.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:440
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4736
      • C:\Users\Admin\AppData\Local\Temp\1008541001\db5e45f26b.exe
        "C:\Users\Admin\AppData\Local\Temp\1008541001\db5e45f26b.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3228
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:772
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfa32cc40,0x7ffbfa32cc4c,0x7ffbfa32cc58
            5⤵
              PID:1956
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2276,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:2
              5⤵
                PID:3152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1780,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:3
                5⤵
                  PID:4236
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2028,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2452 /prefetch:8
                  5⤵
                    PID:436
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3120,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:4508
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3128,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3348 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:628
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4416,i,14673172280064639129,17865103610003187858,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4412 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5572
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:6984
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:4716
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 876
                  4⤵
                  • Program crash
                  PID:5592
              • C:\Users\Admin\AppData\Local\Temp\1008542001\5115a909ce.exe
                "C:\Users\Admin\AppData\Local\Temp\1008542001\5115a909ce.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3936
              • C:\Users\Admin\AppData\Local\Temp\1008543001\184d2b9c09.exe
                "C:\Users\Admin\AppData\Local\Temp\1008543001\184d2b9c09.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:4984
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  4⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1708
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffbfb0bcc40,0x7ffbfb0bcc4c,0x7ffbfb0bcc58
                    5⤵
                      PID:1316
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:2
                      5⤵
                        PID:1304
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:3
                        5⤵
                          PID:4576
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:8
                          5⤵
                            PID:4236
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3460
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3324 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3180
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,6287502031446004720,454659814178118878,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1800
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1600
                          4⤵
                          • Program crash
                          PID:5256
                      • C:\Users\Admin\AppData\Local\Temp\1008544001\e7a83886cd.exe
                        "C:\Users\Admin\AppData\Local\Temp\1008544001\e7a83886cd.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:3636
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM firefox.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:992
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM chrome.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3108
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM msedge.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2376
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM opera.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:116
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM brave.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2872
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                          4⤵
                            PID:1184
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                              5⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:1896
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3463fdee-7b47-492b-861e-9e3c4dd4fdd8} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" gpu
                                6⤵
                                  PID:3116
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2476 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {90b91df1-de00-44b8-bfb8-01fd2f32e4ef} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" socket
                                  6⤵
                                    PID:2952
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3624 -childID 1 -isForBrowser -prefsHandle 3424 -prefMapHandle 3440 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c472c246-c318-42be-af06-a5d308ede8cd} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab
                                    6⤵
                                      PID:5312
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 3280 -prefMapHandle 4108 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d0eb46b-cd8b-4ce5-9478-6b8331a23b08} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab
                                      6⤵
                                        PID:5888
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4928 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4364 -prefMapHandle 4368 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77b157d4-5c06-4c2f-aeef-149d94e0b188} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" utility
                                        6⤵
                                        • Checks processor information in registry
                                        PID:6368
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 3 -isForBrowser -prefsHandle 5236 -prefMapHandle 5232 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {20c059dd-8d70-4acd-ac99-83260208ad75} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab
                                        6⤵
                                          PID:7124
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 4 -isForBrowser -prefsHandle 5296 -prefMapHandle 5300 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f207b9c8-2b92-420e-9ed9-cb024ad3b79c} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab
                                          6⤵
                                            PID:7144
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b94f322c-c40b-475d-be70-c00a6b2bfba0} 1896 "\\.\pipe\gecko-crash-server-pipe.1896" tab
                                            6⤵
                                              PID:6100
                                      • C:\Users\Admin\AppData\Local\Temp\1008545001\c2868357b4.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1008545001\c2868357b4.exe"
                                        3⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Windows security modification
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3724
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                    1⤵
                                      PID:2924
                                    • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                      "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                      1⤵
                                        PID:5328
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4984 -ip 4984
                                        1⤵
                                          PID:6124
                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5784
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3228 -ip 3228
                                          1⤵
                                            PID:704
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1744
                                          • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                            C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5856

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                            Filesize

                                            40B

                                            MD5

                                            73d076263128b1602fe145cd548942d0

                                            SHA1

                                            69fe6ab6529c2d81d21f8c664da47c16c2e663ae

                                            SHA256

                                            f2dd7199b48e34d54ee1a221f654ad9c04d8b606c02bdbe77b33b82fb2df6b29

                                            SHA512

                                            e371083407ee6a1e3436a3d1ea4e6a84f211c6ad7c501f7a09916a9ada5b50a39dcb9e8be7a4dee664ea88ec33be8c6197c2f0ac2eabe3c0691bc9d0ed4e415d

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            ccdf643777a40f82845cdf60a967e1e4

                                            SHA1

                                            861c084928f1f0405ff1b53242e0fa55094d9e51

                                            SHA256

                                            d024456194aae99431c20d58c008e3dcb1ec639a62ad3c16b579f8720dadbc18

                                            SHA512

                                            35f44e7ab8d2078a487ef3fbb4b39a4c8b9673416ea50dcd94630ba953346408e33c74bda053227a50e3b8d58b0e19106fc2aafb2fb9284bd39939f33834ef05

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            68e249bba96c7cf7739b32a4551339a5

                                            SHA1

                                            8529c46e4dd863424e2a3c7463fca9573c0da805

                                            SHA256

                                            a4b5e81a8754f62df7d78c4cbc384e95a8738a06fb0a4dc65d08fb0775dfbd67

                                            SHA512

                                            2ed1ba09831e2ac1ca4ee29b75c15bb74f8aa6259bfb2c0408e80994d8f54970f7a95e69bc3f6ff4989965d20f94725b30dc7f1bfe9a85ca4956c064ff08a9ed

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                            Filesize

                                            320B

                                            MD5

                                            1e25ca8f34e66a9a77fbe64748a32e03

                                            SHA1

                                            e91cfae9bea54df4f4dd7e5e91ddcf926b7c92af

                                            SHA256

                                            7184aab93d69db439bc29d6a42ba87fbe61827c0a3fc9f6a3346fd11295e6152

                                            SHA512

                                            e82a903f38597011517d30cf253a63ad90074346c4c656f4d6d5a4390a6d06fd3fdc4348dfb2d749ab9252975b1345766ad90fe4af9247414e501758f362d1e6

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            984db98034487291ca75c0dc0a335de8

                                            SHA1

                                            4e688b9b4717a517b8d721d76dd620e5e0a4f221

                                            SHA256

                                            886abc1a837498c1719b4998706d2665d3862026b969a9e2f92b75befcf8fd0c

                                            SHA512

                                            ce87cb7fe82ceca4e543262a36d24302c954c5acc65544bc9716305a7c076b9630aced1cdc7a5cac292fa1da77f5714322ceb2b631e2a93d1b66c43409266ab5

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            bd142056563012a3be15bf0b83c4a561

                                            SHA1

                                            c97aa6fbd433260d5d140287242ffb609a69e027

                                            SHA256

                                            d9743345a40d6b7f5f6affc0f8c7d85298d139c4944cf954aa0c3c3d52312151

                                            SHA512

                                            82edab4646752e48a6e5b25f9927c3f6058944b52dc588b2ba86a47dc68ae586fe324b69833dbb0a6895c06baae12c9f07fb6e280dc1bda9361ff3114d89af75

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                            Filesize

                                            1.0MB

                                            MD5

                                            fe993339a25710ebec86c051941d462c

                                            SHA1

                                            1a7a578b7a32bbe2102a789c2321090d406838d1

                                            SHA256

                                            59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                            SHA512

                                            b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            d6b0609c4b6edb45553ff9afbfc95e33

                                            SHA1

                                            2697657b75906d3653f48080ec1f3993c07bd8bf

                                            SHA256

                                            eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                            SHA512

                                            db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                            Filesize

                                            329B

                                            MD5

                                            35ae4a1de9eca85d1a3cf6394d6d0a0a

                                            SHA1

                                            afc5af3f5f5df12eff534f42d387e712f2c99715

                                            SHA256

                                            3b37d0b69d4cb68bf01f22ef597d4e7a1b8302c8940b14cec5bbd681b740311a

                                            SHA512

                                            93f86c0760d679ea1910185e47f2acf844f48144fda9da4076247f28b976e5fb798a6c383f098f28ec65e0ce3e1f1235c1dd109b5d00ce33bf050e5215a70768

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                            Filesize

                                            333B

                                            MD5

                                            ad17bfb43cc27c7af810d7693832ca89

                                            SHA1

                                            febcb5faf4c91b456f701d139c1269143ba8e333

                                            SHA256

                                            afaf9417da6ec7f85b3637d53300b392efec79c026d4109f1672efc2edd1f2b7

                                            SHA512

                                            ca8691c3ef35f45329bee71e9c0f1c98fd42dc25bfa72a9dd45df80534420a800e4e0c82e0ecf93ad13f52ac934fa75f2a0eca800fbc28bc7e798879ed54f683

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                            Filesize

                                            289B

                                            MD5

                                            541c42f1c98b3e1b011d22eba854e707

                                            SHA1

                                            db30188de1f22e3077e7044be1386a5d0ecaed9d

                                            SHA256

                                            0768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b

                                            SHA512

                                            47828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                            Filesize

                                            317B

                                            MD5

                                            d339057df84afdcbcc1445ba1eab20dd

                                            SHA1

                                            fbd89493cbda88de5b4839d732c9fbb7d3ab309d

                                            SHA256

                                            a7af789f389ce0f3df6ee1d8addf3e85ac83cae1ba59a6a4460d7582f705ab4c

                                            SHA512

                                            29a72bc8b899f6540a5a16692139adf6a985a6eadfc932b8e58ec46ec98b792b17c82e50c1121c9a5fd91757ec097c0b4a66a95d7478de737e988ace64145e22

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                            Filesize

                                            348B

                                            MD5

                                            512f0b4358d9dcb8dc5fc9b007f7df61

                                            SHA1

                                            5db1e888c976dc660c1ecd09b6a4870b5a5be7f6

                                            SHA256

                                            019dd73ebd6e4e600499c404b984b23a309ad15a6ff1a6881c6e7f70f54c8ca5

                                            SHA512

                                            ff49cb72c3f1fdd0f9ac2d7310c44999528227613486f42487b8686471c41ae0aefbb5dfda150d55b41b4f9e85f2355dd9b7cfa5d8643c27dfba7933e396e8a3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                            Filesize

                                            324B

                                            MD5

                                            a22ad0efc6a9f100dd39946b9cc79da3

                                            SHA1

                                            e960f17d83ef053e63e1c8ad911074d5e1164eab

                                            SHA256

                                            8316f14f1dd62512f85783ece95e78a2ff63d0536272f522c5fe8a934f1fc33a

                                            SHA512

                                            fca5777058607eb22d1389ec2c67d644d81ffae1fc36e454e163f8cd78243748b711bbc66c3c30f75418ae23860b6b2c9125fe15c99bedc154c2e56b63ee5929

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                            Filesize

                                            8KB

                                            MD5

                                            4fa2b8b4c7580919f96d56afe788d2d6

                                            SHA1

                                            6e023f5281e5a667241c37d623bb439a2f952da3

                                            SHA256

                                            ebeec3ad6f44d31ce3f9a2e8efe24887552335b516a79237302703281dec1879

                                            SHA512

                                            36c44b8b41c99fd180fb244c15460264a8cc34fdd618a743b9793cb29189beb54877306c854395175d8f3ffb92ac59d1b719800d18a65ba647f3d9748503c90e

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                            Filesize

                                            14KB

                                            MD5

                                            04ed0b8f65c8a1e0e9d3fca0a848df75

                                            SHA1

                                            043c70376c843799bb6b543f20475515396986bb

                                            SHA256

                                            4c1139879fb2ea069a75bc3351f41450258e1ce2d4abd23f3c0abb1986a4a2fe

                                            SHA512

                                            2b86b6a5c2ea8e7216fb559b564a29180aa523589118da8491164c9410abe1a73cbd804e68c72a32c48d5364af250f03495495554720cc19d64459d8a08e7bf6

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                            Filesize

                                            317B

                                            MD5

                                            9f2d55ff1e1135f82bedede50cb2f4a7

                                            SHA1

                                            62827d8f158239224be7963d4c00e07933de921b

                                            SHA256

                                            29350baab6add13e2d440d819b66e35133b4b162a06d0d2516d36c2e6bc1b549

                                            SHA512

                                            23fa23cf6b62fc62e73895c8e526e09ae23d35e08d731306fe79803ac50a5a626edadd41defebb3db467b199d5377e5b93270c884df6085ff255810878ddff08

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                            Filesize

                                            1KB

                                            MD5

                                            e99c26c4c0cca685c6b0ff4709b57cd7

                                            SHA1

                                            437d67e170863eb0f926a467d89e4ad88d7e065d

                                            SHA256

                                            427e6466401f0f2a14669fe96fa57333fe381faa1708db4734cf409039a83bab

                                            SHA512

                                            cb8daf5284df7b25391b4dc4cd7df296facc99db399fc76194ff34e47b2f737dfe71aaf62ede0458ded03152a7c4a2fac5c01ae626af7dabfc6001218f7ccb56

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                            Filesize

                                            335B

                                            MD5

                                            8f2eaf6c17fd9d314c93f8e27548ab9e

                                            SHA1

                                            fd3c2fddd8856585fee83f8271184df948319fc6

                                            SHA256

                                            2857cc4f9c6c5f2f2a30804d023167163667560e665b2fff7027b19c3048d89c

                                            SHA512

                                            f714c381fe48ffa6e1a26e8b7902a265cc2f83d9c9a0b423ea8c0bdcd2e63454f910afac2f064e7babfd88c2f25606beeb9b64cec95928642128b7f576db4938

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            d71d942ec52eecacda5d7b0f194b621b

                                            SHA1

                                            7ef720aa5d9aeb08d72dd5d8e96a2e09411b370c

                                            SHA256

                                            a9e2f1cc40c1ddc3a51b2ac380e0dcbc32f37098c268d5c612e19a4901ffbb3d

                                            SHA512

                                            8f3ffbd20471a5c27449925ca0c761bec86d8f42bd6c7516821bcf914cbce7419c747b1781ca279b0a5f2e332bb5d59489722f423dc339b8fe051647b9707b71

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            d7221370095d5298b9d80afef5e2629c

                                            SHA1

                                            6bf66e1b91dd6f2eb87146a417d1f9ab78410ed6

                                            SHA256

                                            ecaddbf943e5cf25072c4cf7a670243ad7b61930172e70edd5d746905d2253eb

                                            SHA512

                                            d9a3310d8ec7c9c32c59285ac0f15d8c4352044a6821d31994db2530ef2094f2f1c5412829b0d79a12c69e1d40d471f71bf90f4860033ae34d3997070b8a7bd3

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            f98f41e0e81f61760fe79a697a53d2f0

                                            SHA1

                                            a77df8c6d80348a4cda08ec4fcedae3cc7dcd239

                                            SHA256

                                            0b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830

                                            SHA512

                                            f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                            Filesize

                                            14B

                                            MD5

                                            ef48733031b712ca7027624fff3ab208

                                            SHA1

                                            da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                            SHA256

                                            c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                            SHA512

                                            ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                            Filesize

                                            86B

                                            MD5

                                            f732dbed9289177d15e236d0f8f2ddd3

                                            SHA1

                                            53f822af51b014bc3d4b575865d9c3ef0e4debde

                                            SHA256

                                            2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                            SHA512

                                            b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp

                                            Filesize

                                            22KB

                                            MD5

                                            cdc98a8bffacd37c3c685991699cca98

                                            SHA1

                                            8b6fede720490d17598d133b4a9740d3d939e9fa

                                            SHA256

                                            d6d03ccca16f88e4fc4a8e68089edc2a772fdf554324a5d128a58b4be4cb97ce

                                            SHA512

                                            553a07af1c7dc58a001a0d7f3074b4206c810a7b7d419363a6e76c9e68a45270adae22312c7d4ff14ab77d350601d7f671a0e2332e3b3f2cc3fe508c0a37054a

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                            Filesize

                                            13KB

                                            MD5

                                            bf449712671ca1d26c3a1b3bf68b54e5

                                            SHA1

                                            00b2832d7d99e1c3ab3d7cd3685dbf1e86f58e74

                                            SHA256

                                            c574caf31e5ab63b4dfaf7b58c087b43db593c8a8cd61197ad662d05c7b0a0bc

                                            SHA512

                                            459282cb912576dcd6ca47a6bd5c1b28dd59ae1817548e17c1f774c3d0591de1eb6a11223db67b2b5003c2529e809554e5cd400a558532a4a82105f80be6d9e5

                                          • C:\Users\Admin\AppData\Local\Temp\1008541001\db5e45f26b.exe

                                            Filesize

                                            4.2MB

                                            MD5

                                            e4ce436577c61894061cb66d79ff104c

                                            SHA1

                                            f9fefdd313f0418ddf9d143bf66566c2932cc0b5

                                            SHA256

                                            f9445c47bc1b7580e4a81cda77fe412ffad705411ab1cc28d164250d275a3017

                                            SHA512

                                            6d3ead9324b8061e32f1e4dc133e6a1e129d24cd17d147595fe8aeb445c462b39a696edb5c4fa005d4fb86113b7183f37103b0e10648490ed87302fc423fb222

                                          • C:\Users\Admin\AppData\Local\Temp\1008542001\5115a909ce.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            ace99b08916d1db23e510939aa97ab49

                                            SHA1

                                            3891ed604b6265e288bb1cfa5f1c952d12e15bb6

                                            SHA256

                                            8682c013ec1c703d754770792b7229d40ab863d7e5c2f2e953be152b57ad138c

                                            SHA512

                                            cca1590d65e0d32ef3c2acc5159436140cef2ab48ad7bc827176daeb503af1343d50d0fc1e946add3f9c5a98c4362284fdea42fa5616967bf49355327037c619

                                          • C:\Users\Admin\AppData\Local\Temp\1008543001\184d2b9c09.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            6fe3130fbf57b8dfe19158188df1e915

                                            SHA1

                                            ff0e2328c167f39bab919190099086312150ff31

                                            SHA256

                                            d31217975514e9ecb073887fad050b7455c43a746a5ee3273368f48ba106d56f

                                            SHA512

                                            bbca47bf611131d0041ebd05f1758d524bbe568b28a09514afa4402c53ad009f08011f79092e8d6116895e3165bf9e584f29926bed725e3e46048dc1be44ebc0

                                          • C:\Users\Admin\AppData\Local\Temp\1008544001\e7a83886cd.exe

                                            Filesize

                                            901KB

                                            MD5

                                            4c4eb739fcbfa409e50878b57d82c424

                                            SHA1

                                            3caa458a9d00da3dcedf459d45ca927348e3f8bd

                                            SHA256

                                            452c647c3a33b28a82330b450c78cf0e18d862a2c7aa756e730ba4a9859d44a3

                                            SHA512

                                            68f9216799874f0ebe61253448d26e5c5b26b67ba13db096b7f8e713d26b87a386aa6e9c0111dd07edd7bab33e86ba55f296eb8d532a691baab077a3be568dcb

                                          • C:\Users\Admin\AppData\Local\Temp\1008545001\c2868357b4.exe

                                            Filesize

                                            2.7MB

                                            MD5

                                            5d3609d2ec83d15d87b45ca4c6333659

                                            SHA1

                                            d4fcc48c2f86e794bab06294a70b30133eda409d

                                            SHA256

                                            01d17f2ada1b93d1d5af1aa0b16af5eb328d4bdb68ddb137167fe26a7ee83c2b

                                            SHA512

                                            423cf45f27f3ee3976694fab7aab03f81f76c61c52c468f555edb1660a260e8d63099135d73aa6f784798dab6af5de2b5796861c56bcfa592c48348ad2cf2753

                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                            Filesize

                                            3.1MB

                                            MD5

                                            035d4f0c02471d8611df2f1749ce4ed0

                                            SHA1

                                            95604864ead15d71306fb081d7b5dc5652999653

                                            SHA256

                                            099744b9bcea8baa80000eb185ff004f5e9dfd2abff28d50a5959858d90e8ade

                                            SHA512

                                            125651e8e9b0c3527e3e59672f57c5b266a6ecbcfee682a372c541339944787564305abeba4f805213105c9416c37fbc5b54a6afbac98ec6908bbb40292d997e

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                            Filesize

                                            479KB

                                            MD5

                                            09372174e83dbbf696ee732fd2e875bb

                                            SHA1

                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                            SHA256

                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                            SHA512

                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                            Filesize

                                            13.8MB

                                            MD5

                                            0a8747a2ac9ac08ae9508f36c6d75692

                                            SHA1

                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                            SHA256

                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                            SHA512

                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin

                                            Filesize

                                            10KB

                                            MD5

                                            f4f3bfa8e964de01b121396b1124b3fd

                                            SHA1

                                            ed1f67c8e38591a774d922451a45325b190ce53f

                                            SHA256

                                            a190da78a777f64f9a63e87bab88d03f3d8441a2389a9e50fa6a08280fba7a20

                                            SHA512

                                            05d34342c82acb917a3a06ecb21485cef119cb3f224184cc8460e3d720e5092d1d109ef129ebb21fa75ce240b1e27a0e22b2abfa6f1c0c5f1f1898f555c0c18f

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            6KB

                                            MD5

                                            d72b4f348f2958728243b529515f4a34

                                            SHA1

                                            e8883e99df42c61572636f33cfa828dcc58c3634

                                            SHA256

                                            2ea8635707e7ec6533d1eadd9832956168fdf19b6171092fcdaf2dd359c1a1ef

                                            SHA512

                                            f4719b792ea2d4a741aea5fdacc2be1f3afbf86b84324a03812298ce9d975c44b94ac0cf871cedf4d310e3b788186200e3fc5ca15de1e31613c1eed3afadd8f9

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            5KB

                                            MD5

                                            7fbbd2a8b7d1078d70b5912146cff1cf

                                            SHA1

                                            267b81112f41b81d385d7a1075529553bf8d49bd

                                            SHA256

                                            5640d0fa6414980245ec10280f2c058b63d3e81015e91ee78d6d7dbb34f3cbb5

                                            SHA512

                                            8d9a10c891709691d4cd2de513ee41824fb6bd20a2d53218e29793db670b3168090a22357b69c0e925317ae843a51a9618f5fb8a9bc94004c002f24fa69eedac

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            15KB

                                            MD5

                                            c561bb054d14c857deac38be97cf5e4a

                                            SHA1

                                            968d3e94643b0e2b0c9414924f86f1a906d9f8ac

                                            SHA256

                                            8312db1427aa36faab2d46e498d5c5d4bec9de0d74465995b40e540a5290db0d

                                            SHA512

                                            44180630c1260f4dbef0e8ea8d5c1acd752b13d1e2dac5c0ab0be11d1ce349c965dbd9a27302dc300df045c2c1b0921372d27e57d6f25fa264efd82d0ce56df6

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\438e37e8-d7b4-4d66-b84c-4ff9c86aec3d

                                            Filesize

                                            26KB

                                            MD5

                                            c1705046a289012c6764a714466b50aa

                                            SHA1

                                            09629829435fd2d6487e3d468cffc051eee667f3

                                            SHA256

                                            876bed9e73ce31626ba06eee1a61217d0f413492227afa4c0a792cd266692063

                                            SHA512

                                            7d7a17a59877aa0318270aa89ec06b61c86bb1f40ff575b80c040601c7c4714ce7cd0d3d31b3e2ce2721267c4f6e1a2ff059c34c17bb0d25838e5895fa620c9d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\5f248573-a82c-4417-81f8-41cea9f80e29

                                            Filesize

                                            982B

                                            MD5

                                            1b58869d7d75f9bcc9651f936ccf6e9b

                                            SHA1

                                            dbdacae7be795e29a4351e726196ad1cc09a8d54

                                            SHA256

                                            bd95919bb3879fc13d7bf77e98ada9a08ac849f4412c039ec35e99e9d7090b61

                                            SHA512

                                            001b6a06754133232fa37efbc2829df2322bbb26a8626f504ba06192e4b18392e0fe26928ea75e11257278ada0229c964e5884a0d50d8b31b71faa5b6a008741

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\718215e6-716f-4de8-971c-400f8ea9eef0

                                            Filesize

                                            671B

                                            MD5

                                            405bbe391c6e1f84126a6f8291e4057a

                                            SHA1

                                            3d16200a88860ae6838af13b9bfc3fe7d23b4761

                                            SHA256

                                            036edb7b7c544bcbe175e5883d47151e614a0e8211bd3472d0e1cbe04074f17c

                                            SHA512

                                            516fdcc9a85337e165eb24de873ee2a304a018d53abe3ced64f5cb9b59cd03a88f08e50beb57908e68dae8883c05446c8032a909f729fb2ab9ccc749ff3493e9

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                            Filesize

                                            1.1MB

                                            MD5

                                            842039753bf41fa5e11b3a1383061a87

                                            SHA1

                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                            SHA256

                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                            SHA512

                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                            Filesize

                                            116B

                                            MD5

                                            2a461e9eb87fd1955cea740a3444ee7a

                                            SHA1

                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                            SHA256

                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                            SHA512

                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                            Filesize

                                            372B

                                            MD5

                                            bf957ad58b55f64219ab3f793e374316

                                            SHA1

                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                            SHA256

                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                            SHA512

                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                            Filesize

                                            17.8MB

                                            MD5

                                            daf7ef3acccab478aaa7d6dc1c60f865

                                            SHA1

                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                            SHA256

                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                            SHA512

                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                            Filesize

                                            15KB

                                            MD5

                                            307f9d79eea4d58f262626a39dfb5023

                                            SHA1

                                            bff4d900e3e1dc1b7c0e4157f1abec64a848a2d7

                                            SHA256

                                            b08b1192d9ae80df65e68f310e7c27df5627efb84f412447907b12a8cf85fde3

                                            SHA512

                                            f25a36e75300804444109b4326e4d0b24258d6d2c318291f2a255ee72d487a595e0c6eeb6d568eddad907bf4657cee652cf95b0548625357a42f99e1cd61c47c

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                            Filesize

                                            10KB

                                            MD5

                                            bfc9d1ce0de600c8d953f8a0734a9609

                                            SHA1

                                            06f590c260142838d1a089fdb8d80a0dc2000efc

                                            SHA256

                                            50c151edc0a59e375e275051ecb53bbde6d8703c783d5c2c35961bb60f0eb497

                                            SHA512

                                            010bb6f27a7a07f137947918a1ab87aa74f3b677fae9b3246c435bcf87a808a23410b8d10225249a062ab78eb340a873ca18efdfcd13a03f4afe4bbe52d48c3a

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs-1.js

                                            Filesize

                                            12KB

                                            MD5

                                            2c0fee3555cf639eb691d4d8b236fff0

                                            SHA1

                                            95c957f18dcbb9d25ccbb7d6decee08ea555ce6e

                                            SHA256

                                            ee7a98119ee3de2e6ca2677082e5edd770e7a9dede2ec6f06e7267196d6b4ca8

                                            SHA512

                                            fd8ee8ea0bcf4b59c7d76066472ec5750c90058c09911eb98e6c12ffdbbf2ef01ffacd9fb3de237953f629d0f4f93942e0d8f38d547e6f2d96e349d6088c8e24

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                            Filesize

                                            15KB

                                            MD5

                                            3acfe3eb29abc5cab095ed8307475965

                                            SHA1

                                            651d965a59ade9a141c36da3d235f10bf78e6efb

                                            SHA256

                                            052943a4abdb700699fa387c5df378b45664b30cac9bcd875ccceffdf81078ee

                                            SHA512

                                            ab1e782ef5ffe72555191c810aeaa936e16dde871bc96782fff9b41e47b3a3335a5926bf3ecfdcf44acc5a01ebde67ee7bcbf7b6c78df9cae500662f2b0ec565

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\prefs.js

                                            Filesize

                                            10KB

                                            MD5

                                            26b37dd55702613169df1b242f66939a

                                            SHA1

                                            bf4b703823d95472d8fff6f19727dc4d7260643f

                                            SHA256

                                            50de75e4630f345b0ced23c0b1539ca88321df368913fe9f606bab4f8f5f9a3d

                                            SHA512

                                            047caf559eff554005d7387f5ffd69a02405f912b55b80ca17a193c0fb4c901b222ee58c816d0afcbf47e32bb07517822e7ffadc4ae7ca777ee3b560a4a9b254

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                            Filesize

                                            2.1MB

                                            MD5

                                            3fabc2ca95928b476b108e14240baa06

                                            SHA1

                                            b2163aa38e615b793a91c5a74df0840c973b0d05

                                            SHA256

                                            d43b0019f8ee2df9f512ceac00823f6f96c4bca324cf868b11be10d14625af4c

                                            SHA512

                                            6a34c4f4d08b679476f6160929ac6e757ed7b8e33a1aff02848b0c1975f4da5b93b96947b2dc3d61f0795446491dd1d825fab7281bffe3b9b8bebd5991c4b5fe

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                            Filesize

                                            9.6MB

                                            MD5

                                            6d900024bc91d5643c9e39550a6c02b9

                                            SHA1

                                            fc3817262032acef99044ae057b0189e06b38a20

                                            SHA256

                                            3a195481d362dc1542f887c43089af3e73ee7bd273164a492659ec3cb3bef24b

                                            SHA512

                                            3bc5f1629efe87fd6e8dc4d75cd69216f1d3e1ad87a3a90a868c956aa17222fcb8093a4d8806cee303a6e057dafc1d39bb96065fe8732d6773b33cc9eed437a6

                                          • memory/440-3-0x0000000000630000-0x0000000000941000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/440-1-0x0000000077C94000-0x0000000077C96000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/440-0-0x0000000000630000-0x0000000000941000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/440-2-0x0000000000631000-0x0000000000699000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/440-5-0x0000000000630000-0x0000000000941000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/440-18-0x0000000000631000-0x0000000000699000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/440-17-0x0000000000630000-0x0000000000941000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1744-2859-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/1744-2858-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/3228-167-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-81-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                            Filesize

                                            10.4MB

                                          • memory/3228-603-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-47-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-93-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-947-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-42-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-112-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-91-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-48-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-46-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-45-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3228-623-0x0000000000390000-0x0000000000FE2000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3724-158-0x0000000000930000-0x0000000000BE2000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3724-165-0x0000000000930000-0x0000000000BE2000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3724-164-0x0000000000930000-0x0000000000BE2000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3724-605-0x0000000000930000-0x0000000000BE2000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3724-608-0x0000000000930000-0x0000000000BE2000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/3936-64-0x0000000000640000-0x0000000000AE4000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/3936-92-0x0000000000640000-0x0000000000AE4000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/4736-90-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-2841-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-19-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-20-0x0000000000991000-0x00000000009F9000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/4736-609-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-2856-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-166-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-2853-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-2847-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-625-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-44-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-43-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-26-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-25-0x0000000000991000-0x00000000009F9000-memory.dmp

                                            Filesize

                                            416KB

                                          • memory/4736-24-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-22-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-1008-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-23-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-21-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4736-2023-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/4984-80-0x0000000000640000-0x0000000000CDB000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4984-113-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                            Filesize

                                            972KB

                                          • memory/4984-139-0x0000000000640000-0x0000000000CDB000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/4984-599-0x0000000000640000-0x0000000000CDB000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/5784-628-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/5784-626-0x0000000000990000-0x0000000000CA1000-memory.dmp

                                            Filesize

                                            3.1MB

                                          • memory/5856-2862-0x0000000000A10000-0x0000000000A22000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/6984-1674-0x0000000073730000-0x0000000073864000-memory.dmp

                                            Filesize

                                            1.2MB

                                          • memory/6984-1673-0x0000000000A10000-0x0000000000A22000-memory.dmp

                                            Filesize

                                            72KB