Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2024 05:22

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    2e0b7ce5f1f886f477023b165b5edfec

  • SHA1

    091bd515d53e83ef4d47e6616f24415a056a3ccd

  • SHA256

    140f7ea0334b06302663adcb3bab944439ae5efde9465a69e655f490297674ba

  • SHA512

    a1ad471ad3c9bcfce4850884b52da31498c0fab61e590e51b50612443e97ad44d46f157f7dc4507eebad6c323c7d4eefe169a5b7290b1517531fc2272030f27a

  • SSDEEP

    24576:XFWKcW3OuZZL3c7j2u5nWvgAB9zmAk+2+Y8PMLq/5vzsSH0F1nq00wrRz9eLtUkq:E7WVZZLs7j2hvgWt1JHPsc0L86EU3

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\1008634001\rimdll32.exe
        "C:\Users\Admin\AppData\Local\Temp\1008634001\rimdll32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3512
      • C:\Users\Admin\AppData\Local\Temp\1008641001\42fcff268a.exe
        "C:\Users\Admin\AppData\Local\Temp\1008641001\42fcff268a.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:3428
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:5288
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff940e3cc40,0x7ff940e3cc4c,0x7ff940e3cc58
            5⤵
              PID:5312
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1984,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1972 /prefetch:2
              5⤵
                PID:5680
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2004 /prefetch:3
                5⤵
                  PID:5504
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2508 /prefetch:8
                  5⤵
                    PID:2056
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3340,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3352 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2588
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3360,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3512 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:2452
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,17681989026355739502,16057253721836223637,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:648
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5480
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1532
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1288
                  4⤵
                  • Program crash
                  PID:4876
              • C:\Users\Admin\AppData\Local\Temp\1008655001\cb640baf4c.exe
                "C:\Users\Admin\AppData\Local\Temp\1008655001\cb640baf4c.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:3588
              • C:\Users\Admin\AppData\Local\Temp\1008656001\378ebfba68.exe
                "C:\Users\Admin\AppData\Local\Temp\1008656001\378ebfba68.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2596
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
                  4⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:3576
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff93a74cc40,0x7ff93a74cc4c,0x7ff93a74cc58
                    5⤵
                      PID:4660
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:2
                      5⤵
                        PID:1660
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1928,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:3
                        5⤵
                          PID:4452
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2276 /prefetch:8
                          5⤵
                            PID:3000
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:4048
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3204,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:8
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,10453932213162730169,12509161121944521274,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:1920
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 1536
                          4⤵
                          • Program crash
                          PID:5516
                      • C:\Users\Admin\AppData\Local\Temp\1008657001\8b24c83cf2.exe
                        "C:\Users\Admin\AppData\Local\Temp\1008657001\8b24c83cf2.exe"
                        3⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of WriteProcessMemory
                        PID:2312
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM firefox.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1636
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM chrome.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3704
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM msedge.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3524
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM opera.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1988
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /F /IM brave.exe /T
                          4⤵
                          • System Location Discovery: System Language Discovery
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5080
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                          4⤵
                            PID:404
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                              5⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:2112
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71a52a7d-e3b8-4154-b19d-05d572be4fc8} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" gpu
                                6⤵
                                  PID:2908
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {df9749ee-bcbc-4d2b-a0ea-a5de5a4033f3} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" socket
                                  6⤵
                                    PID:3108
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3348 -childID 1 -isForBrowser -prefsHandle 3156 -prefMapHandle 3272 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b3429e5-8780-4c6a-a510-d7bbb3ba8194} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab
                                    6⤵
                                      PID:1536
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3304 -childID 2 -isForBrowser -prefsHandle 4024 -prefMapHandle 4020 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8de8b8e-3a37-4f2c-950e-2a910c8d5f7d} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab
                                      6⤵
                                        PID:3932
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4620 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4608 -prefMapHandle 4612 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c51f4c13-e9e6-4505-bacf-b25a0db9e98b} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" utility
                                        6⤵
                                        • Checks processor information in registry
                                        PID:5548
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 3 -isForBrowser -prefsHandle 5512 -prefMapHandle 5508 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fac692f8-f43d-4209-9404-89476291b974} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab
                                        6⤵
                                          PID:5656
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5476 -childID 4 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {981ed694-a23a-4f6c-b048-c01c088b2c13} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab
                                          6⤵
                                            PID:5728
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5824 -childID 5 -isForBrowser -prefsHandle 5832 -prefMapHandle 5836 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00538c5a-7584-45e0-9a54-3d3cca161eed} 2112 "\\.\pipe\gecko-crash-server-pipe.2112" tab
                                            6⤵
                                              PID:5688
                                      • C:\Users\Admin\AppData\Local\Temp\1008658001\04bcc09da9.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1008658001\04bcc09da9.exe"
                                        3⤵
                                        • Modifies Windows Defender Real-time Protection settings
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Windows security modification
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4212
                                      • C:\Users\Admin\AppData\Local\Temp\1008661001\installer.exe
                                        "C:\Users\Admin\AppData\Local\Temp\1008661001\installer.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        PID:5156
                                        • C:\Windows\SysWOW64\dxdiag.exe
                                          "C:\Windows\SysWOW64\dxdiag.exe"
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5200
                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                    1⤵
                                      PID:5080
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2596 -ip 2596
                                      1⤵
                                        PID:5468
                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                        1⤵
                                          PID:6048
                                        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                          1⤵
                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                          • Checks BIOS information in registry
                                          • Executes dropped EXE
                                          • Identifies Wine through registry keys
                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:4440
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3428 -ip 3428
                                          1⤵
                                            PID:5588
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:380
                                          • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                            C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                            1⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:2880

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                            Filesize

                                            40B

                                            MD5

                                            1fd21a5228803360e7498b21377bd349

                                            SHA1

                                            c028d9a423b995bb2f9d9b56ef09e5a4f9535b38

                                            SHA256

                                            920270c469d0fdd572881597d30bae6f24faec32c8a1e7e689186947ac7958d3

                                            SHA512

                                            c2324e1b0a32c3d4abdac5ee1c2e663d1e49c24c17f0b5a5dac56cc867f67d2665f29148de2773f2e048292b189d136876b557ae9837517f612155633cbb09b2

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            ffeb127997d8ad269fcf6436b3ac29e6

                                            SHA1

                                            1d4a8ded4b8950cf0b7c47b130242de8856161e1

                                            SHA256

                                            1436e492cf994ce0891ab1446fed9d286c4c2ab42f27fcf8d95ddd7b41e7f7b5

                                            SHA512

                                            d9ed3116dbb2da9c065baf67c9c88ce008fcfe60dc8b42eb2a565ab27b60185646c4792739eacf75282cc35fdc8fff321284b44746b91228ccdd19e69fd606b5

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            a10061998799c60009c5003f8d35732d

                                            SHA1

                                            e741dde6d7839ea7ac5efdeb7969c73f3100d827

                                            SHA256

                                            7d79c2c7c9f6bcfd74b21da8c7734cfeb7a8bb2509b4581e866f7d91b7594540

                                            SHA512

                                            5a343934e0634f4505e770112bbafc86c39a0612897fe0108517dc2be7040061cbdacb32ddfc0af59283a9b5d2f5da64cfd4fc45882098d071b55ff09dab09f6

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            06203d256a2afe292914817429992d3d

                                            SHA1

                                            ae0585868d7633c8061d1ef8924e1dd889595aee

                                            SHA256

                                            96d8106d5c428911a02695f686e1bba3e6ce97124dd35ff29056de27c9d9c0e1

                                            SHA512

                                            1b0b481689b33a37b6c883ec357b7831d7a94219a098b7e31d34c32699904fa92fb3f5f1f1fc45f2018e6bc4d47471de11c7229a92c2fb0154455f9a66001634

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\LOG

                                            Filesize

                                            317B

                                            MD5

                                            33bf78611178d99aeb1c9db5422c6be1

                                            SHA1

                                            824dc098cff34a5040e0d558d91498438636f9b3

                                            SHA256

                                            65ca80a7065bb20398b662d55be99735cb1e60baf39f2bbc49efd9dc64545ef8

                                            SHA512

                                            20f61b64b28f07ab21f9185d76cc19581ac0f74ba31fb4c15433c8945b64dbe2a11b84dd0593411b6c0a9b539ff86d795972cc64755f6c956abfa5392ebeae0b

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            a7898b2dc4064c498d92f4a82c0b9745

                                            SHA1

                                            04981a79e1e7d75566fff880c648d20b26b1c215

                                            SHA256

                                            051edd74014114aceed5a6ab9bea59cf13d831c8a08b272e8916dbe55e3db25f

                                            SHA512

                                            3bb87dca5900154842a349f940393db0083d4f6f205226f65ee5ab4f7dbdc78f78ec84e40f25956324056d3e5acf59a37a892a18daa2bed5adb2957588b99213

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            a8c8b14dd999d537b9fe0df199ff4eaa

                                            SHA1

                                            264999cb4affa835a2fff17e11a96bc9ccc16ba8

                                            SHA256

                                            ae7ed06598745be57dade02e45b9491926e63e94aace030cd048b7fcf67ca77e

                                            SHA512

                                            daed7afeb7e8342d1b5e25927b0b9abaedb3a83dcd8f08ce62aeb2e763f6fe4c63306c3710b3e73d8d39f1b8e98eaebe57fb6cd25a9f9b6071bc01344e14b790

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_2

                                            Filesize

                                            1.0MB

                                            MD5

                                            fe993339a25710ebec86c051941d462c

                                            SHA1

                                            1a7a578b7a32bbe2102a789c2321090d406838d1

                                            SHA256

                                            59ce81d41051a1d16c02906cd586fcdeabbe7ee30ea7b7b1bb0970b981ffa443

                                            SHA512

                                            b81201876efadc61a8fb48718abb16f7f458856f2ee676db8b0da36790492ad930585c14ce200e7a9e079b8115b15e20ed95176cbfdc337b3ab732e5fe72bbd2

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            d6b0609c4b6edb45553ff9afbfc95e33

                                            SHA1

                                            2697657b75906d3653f48080ec1f3993c07bd8bf

                                            SHA256

                                            eb5cc165f4f69f7a3e72851b1b63e67efa9afb3c96bf8aefc962a5fdbdd6cc2e

                                            SHA512

                                            db4c837c9a8a30e65f0f634bcceecff3354d6b72b34536e584fafd02eb103cb4a6b01522d4463d8c54e6852d28a71d9ec8997e2f353e59ea8724aadbbc2a80ca

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                            Filesize

                                            329B

                                            MD5

                                            c4fac24ff7b0e870f7297c67456e03ae

                                            SHA1

                                            bdb84b902f52b8ef63cf98a91e621340e5aa39fd

                                            SHA256

                                            54eae9001612f82c78983f6a1c59e4d2f8397c27d792e0c23203d278126cc626

                                            SHA512

                                            ff6d0441f77e1e12e26a0e57e6be76005b4a20a4b8a48cd63d772cc2b5c52014fbdba36c0980b5006946d23d2767ed2055b2278b2662909783a180ff02d6cc42

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                            Filesize

                                            2B

                                            MD5

                                            d751713988987e9331980363e24189ce

                                            SHA1

                                            97d170e1550eee4afc0af065b78cda302a97674c

                                            SHA256

                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                            SHA512

                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\Database\LOG

                                            Filesize

                                            333B

                                            MD5

                                            8c9d03ec5692b56a8ee1db547f3bd0b0

                                            SHA1

                                            2c2d25689de7ddb264489d066111938270a102fb

                                            SHA256

                                            03d9aa4188d438657db78fb010492f91ef1fa6c7a64c5842cf833c156534c7a2

                                            SHA512

                                            fa1d4cd94b7dd0984e3f453ac2c89b2d06e253c8338328290ab127a145a31ed761749ad6a9bfebd6461235bb3f61261207945be1726f549819cc34df247930a2

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\000003.log

                                            Filesize

                                            289B

                                            MD5

                                            541c42f1c98b3e1b011d22eba854e707

                                            SHA1

                                            db30188de1f22e3077e7044be1386a5d0ecaed9d

                                            SHA256

                                            0768e811c51ac61a8e573ac6b53f89dbb1d89eb2fcf62536a9a5f730329c584b

                                            SHA512

                                            47828c1b40deb8d37d6ff4fc8f7673fbb59b40e07f54f0fa4121b91941160134c251e20f7f28f7ee5185f3c8aee2b7e95a1bef573bc64c68912016accbe90604

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG

                                            Filesize

                                            317B

                                            MD5

                                            fca8d0d450df24db664be85abf39e239

                                            SHA1

                                            68e90227a5615176d1846c5276dd21efbe91af1b

                                            SHA256

                                            72eb3a8ebfa99bc59ee840dd31947c24e86dadcaff0852e2639d5c5eab6fb710

                                            SHA512

                                            f837ee9e90aca0be2a2fd668f7f6e397e527e9116f50314924436d06b93ab1e5a68d719830991a8a0060902259112dff0b043d6df21ba1518b029eb23f641008

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                            Filesize

                                            348B

                                            MD5

                                            0b820efbfefb99265b0beb5d09d80e12

                                            SHA1

                                            8cfdbcf9e818c5f86783eb9cfc031a8fc275e882

                                            SHA256

                                            02426ee0a539009200e12af922502e2d651df8cb28521be10f5489ea1160bf7e

                                            SHA512

                                            cce7d01e650f67c256c40e6f61810987e6f8acfcfce57264b487207a81e3d9c7618eb1a8f79940ca551b1842d266dee1cc0508fa1fd36f76e3a7dbd83ed4f231

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                            Filesize

                                            321B

                                            MD5

                                            7c97027c19dbd02a07eeb5f0aa995e31

                                            SHA1

                                            2fb4d1942427a6d525f8f20c719b2552279e4ea2

                                            SHA256

                                            3cdb46192ffdb40fdb14d623a2efe0aefa51d54519b1f85acf4fe626964ef759

                                            SHA512

                                            04f3f8e52849fc7d339e4e0f8a2a80af104324266f09b37784551a2051f9859f37fcf66d7d84025f2cd0d0fbc5eb2a73e84f647c83aaa073999e5419162b5122

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\QuotaManager-journal

                                            Filesize

                                            8KB

                                            MD5

                                            d2ffbe0fe7c4cd4f1970a24d1f843397

                                            SHA1

                                            75eea770bb51ef28da7395561cb70bb894153f45

                                            SHA256

                                            94f0e4393d39ab15ed241e6c5fb43998735f23e535c40f60a5e244301535efa2

                                            SHA512

                                            dd47070717fcbee3630b9904771d3cda0e8115aeac2bd76d5e894fdbc27abe431f025b535b46d0aa440877062426e304c4875667377b5ab3f292d0205959f711

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000003.log

                                            Filesize

                                            14KB

                                            MD5

                                            831d074a683800664e6eaa10809970f6

                                            SHA1

                                            f094f44aebf2e33b6882d3ee3669fd63e0b3c897

                                            SHA256

                                            913157648ed98fe494e0b743dbf20914accbdf3d37c67f427488f0be3195398c

                                            SHA512

                                            1da9f15585572950be495d3799045d254dee010b7fb44e9e205a829a7a722438e586c3c179ffb6daada411d0caa776171b3d425e1d5b75a6906717217a748809

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                            Filesize

                                            317B

                                            MD5

                                            e6869efe97979b40d8f1d4b2a2df1e30

                                            SHA1

                                            d7841e7608315ba4c022aa6eb0cdc690f4cb707b

                                            SHA256

                                            c7251ce26ed3bae70c829ce49cf51fc3c49645ddbb68e2f4270adb705b80f4e5

                                            SHA512

                                            f6494e41ab70ee3a6233ea02e1b0de05cf786d6de4d3039c48eda80e4bec73486563cb54890c61ec2db7a24fdb11f3bfe84227e42b5de6b01340c2c71945bb4b

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000003.log

                                            Filesize

                                            1KB

                                            MD5

                                            b929e77800ac39e2df35dc2812b851e3

                                            SHA1

                                            c54cff1159b9137cc081c82a26ec7169f191cb63

                                            SHA256

                                            9c592ee5b8a897b4fd0932a84b4bd0cf0336eaf3a83abfd541ca306051a32ac4

                                            SHA512

                                            04d9d9afab3b928fc095e1ef9465e6245474e80cd2639130e53f895d4f7eb4dcd42e8001a589bd97bd5f2146aed36fe36fbf0e45af28c76df736d9f46ac31d02

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                            Filesize

                                            335B

                                            MD5

                                            14fc5e22c34bd3bd77f63c0628fd4fa9

                                            SHA1

                                            9e9e17f1d88c780c33315ddf06caf0b3c5f95fe5

                                            SHA256

                                            4e5fdb5bc48f65bf4cf233fdb0421223f33f833915a12c7ec421cab1fc3f594f

                                            SHA512

                                            0e763bfe002f48b09ac776acf5f2e82625224e9c5ffeb9f9572a8e30018dc398bfc6a8a8dcdc31f6465735b8a92afea63e7bc33b3d8bd3b49d7fd26f25665a56

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_0

                                            Filesize

                                            44KB

                                            MD5

                                            799bceaafec4826c0de0d5f5207668f4

                                            SHA1

                                            6de4de322c9b9f090d0bdd93d3191c5e07af98f1

                                            SHA256

                                            91a2e9768e3f43ce17c484a3e1ab8339b78be20b2a91b2c7db37a458a5f9f3fd

                                            SHA512

                                            f7ad69d0e06f313bf2645275b67b8b8efb186b87398c17ddb2cca67f8a8b2e3fef02493696478967d238ff695e6541f7c3b2fc20b6092f5266757e4372ba3fa4

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_1

                                            Filesize

                                            264KB

                                            MD5

                                            f10e8874fe8d7413f7d0b4f906e0ea0e

                                            SHA1

                                            ee8644e5809fb2547cea36d8efd8e100ffc08293

                                            SHA256

                                            51b1738a39a2dda1ce05730755d08b8f7174e8f0fa3113df50bd807e8aa1ffcc

                                            SHA512

                                            5fb724359fe39c941909995d0f29321c0b15e4723d8b2a1c8c33649dca154c0ef4f80b0aaa0e69503fe4e97b5317055b8f2ee1ce171520fae437e628e451ebd4

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\GrShaderCache\data_3

                                            Filesize

                                            4.0MB

                                            MD5

                                            f98f41e0e81f61760fe79a697a53d2f0

                                            SHA1

                                            a77df8c6d80348a4cda08ec4fcedae3cc7dcd239

                                            SHA256

                                            0b786157e734230df829a7fe738c2303e44da7048ec8f6e5dc28d4976e3f1830

                                            SHA512

                                            f8e8cd1df8569cb437807f3471b6ee0f282c3ea301e4823cc90a348f2c6870eabd85d07f46236a80d06eb263713a90a41851878e0d58f34740a864cd3a82d4af

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                            Filesize

                                            14B

                                            MD5

                                            ef48733031b712ca7027624fff3ab208

                                            SHA1

                                            da4f3812e6afc4b90d2185f4709dfbb6b47714fa

                                            SHA256

                                            c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99

                                            SHA512

                                            ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029

                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                            Filesize

                                            86B

                                            MD5

                                            f732dbed9289177d15e236d0f8f2ddd3

                                            SHA1

                                            53f822af51b014bc3d4b575865d9c3ef0e4debde

                                            SHA256

                                            2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                                            SHA512

                                            b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json

                                            Filesize

                                            27KB

                                            MD5

                                            642b7bbb4573e090f589af99dee5885b

                                            SHA1

                                            f7294a8fc7a44168fbc9d788dd0125d37f717991

                                            SHA256

                                            abf5e8784c917942cfcf7ceb31cad41c7fa1eb0940aa4efd62abfe2a41383199

                                            SHA512

                                            69c43096a9c07e1e23806d2c40b5de76c46997d94d2c18b00cb8d308a7e1a9d5d0db0e7036277851677025ba0a4accc2ef196a1f1bc6c69e06e4b537cb280cf6

                                          • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                                            Filesize

                                            13KB

                                            MD5

                                            a5d72b2cda9f66fb66c8041d78bc9da9

                                            SHA1

                                            01534b64021840b28e20612338d8f0bb4779e71a

                                            SHA256

                                            12935a130d016079dc5de9df75014c95c0cd4305b93de024372a123e5a8a0cf4

                                            SHA512

                                            f99f21eb6ea05c9812ac950a036cb64f2b3bc01bfb62648595a694c50747f372bf272b66be0ec60a221abc421743595bde187fcb43a27601a88a31e571ab0433

                                          • C:\Users\Admin\AppData\Local\Temp\1008634001\rimdll32.exe

                                            Filesize

                                            386KB

                                            MD5

                                            03ca3823af479cb440c0283066b794b1

                                            SHA1

                                            fa607b381f390512effe17926dfe1783a48e1364

                                            SHA256

                                            a3e66240301c3b9a402704082ce72ed1055a5c3248406d3a0a1f1ac075798408

                                            SHA512

                                            de4b9ab2caad3e704b6224073d6b80ac46b3ae5d077dce549f3d2de1a64754819c8ca51a4ff0eee8e55e1750eac1bdd18919e3f5e33780f6326bc390dbae04bd

                                          • C:\Users\Admin\AppData\Local\Temp\1008641001\42fcff268a.exe

                                            Filesize

                                            4.2MB

                                            MD5

                                            08305ea461f669a3cec283e3b3109d49

                                            SHA1

                                            be401743abb7a28ba167e612af473aca20ae333a

                                            SHA256

                                            ec04fbfddf968df86e0d0e0c0943bf3bb32a70b4fbb7280519a2f73d448fdc96

                                            SHA512

                                            76c35c666c6b5cecf474af20ef20a0527e663871c1b61092f0eabcc90a6c2ac8c93b88c12ef609a79a65193259128809c2173d6ed7113b6f71cda1df0a9f919c

                                          • C:\Users\Admin\AppData\Local\Temp\1008655001\cb640baf4c.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            be99e6d317db92832a715c0d81a73d86

                                            SHA1

                                            967c6a2baa432fc148ff7b5a11f2878706c097b1

                                            SHA256

                                            cda93e6fec4d55eb040345d437e46c7ef2cd53a04722787e7c8304c920511861

                                            SHA512

                                            0134977176ccd0716aaa2dd5488a78a01210075c805271db05042b59cf0c69acd3bf2a50096004bbd6a406b73bb7573821bcbbbec00d2f8ed156cd3c0ea16509

                                          • C:\Users\Admin\AppData\Local\Temp\1008656001\378ebfba68.exe

                                            Filesize

                                            1.7MB

                                            MD5

                                            85c52cefa22a78fcbd9b6fd8ee2d5e50

                                            SHA1

                                            f40c5b7bd336b4fb5b187602e68045a091137126

                                            SHA256

                                            5323c3c7c0c60e5e69b8b5eeb05dffc8ce3bbeb52335bc5ed51f7179186d7df9

                                            SHA512

                                            18cd50049c383dd5731b4fffb32336e6ef456782bc8356e8c24ef2c9e7e54873515f7513ce22b78b173973469356023053e7ee213c481d3b54387c840a7e3c2e

                                          • C:\Users\Admin\AppData\Local\Temp\1008657001\8b24c83cf2.exe

                                            Filesize

                                            900KB

                                            MD5

                                            a9b8660c40e0582b27b38387fc2a82a2

                                            SHA1

                                            4258bc33d119db4931e48bf72a87d032e330c671

                                            SHA256

                                            5d8ae2f74c7249bccbc24fde4e6e1bde4e72be6e3709f81fcf3f35cb0a5c91b8

                                            SHA512

                                            27041d68d53eb3eb5dad427c9c4edd6e5a91d32fb733533c6d4636a5396473d5f68c08f6ad01f03cab6ebe6777847f0a63c331a40c08f78bd746682bd33dbe70

                                          • C:\Users\Admin\AppData\Local\Temp\1008658001\04bcc09da9.exe

                                            Filesize

                                            2.7MB

                                            MD5

                                            05eaf12f2c44f62d98c11e8e8530fbb3

                                            SHA1

                                            65faecebf9b66cecb18921f5848815c3490456ab

                                            SHA256

                                            726a12b068a2970d06e89984c2eadb44f5404e0aa9bd776f5725d87fcf4c6129

                                            SHA512

                                            00a011cc6cecc64ad743916a93cb7a3bb4f057cec3659d4f8505a6cf5780cd76747c8ebdd0678c4bd1f8c39fc491d7f581f3ac5f119d3842d4eb84f2c9a76e17

                                          • C:\Users\Admin\AppData\Local\Temp\1008661001\installer.exe

                                            Filesize

                                            13.2MB

                                            MD5

                                            29a0fa0fc484ddb637bcad2ad32f5721

                                            SHA1

                                            f40e2ead6bdf1c84c2259493e913dc07a6a66e49

                                            SHA256

                                            0029ed3abbdfb26ce8f939182f9c44e20c22e85065830eb318ec14cc5ab88ceb

                                            SHA512

                                            00fc9213acd055dc85640c21b3fc680098f4acf5beea0f68f2251a6fae60b891a88cda0c8aa2e2991feb6825f20823a23c1f96d30a24953b3c7c2f1465e90955

                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                            Filesize

                                            1.8MB

                                            MD5

                                            2e0b7ce5f1f886f477023b165b5edfec

                                            SHA1

                                            091bd515d53e83ef4d47e6616f24415a056a3ccd

                                            SHA256

                                            140f7ea0334b06302663adcb3bab944439ae5efde9465a69e655f490297674ba

                                            SHA512

                                            a1ad471ad3c9bcfce4850884b52da31498c0fab61e590e51b50612443e97ad44d46f157f7dc4507eebad6c323c7d4eefe169a5b7290b1517531fc2272030f27a

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                            Filesize

                                            479KB

                                            MD5

                                            09372174e83dbbf696ee732fd2e875bb

                                            SHA1

                                            ba360186ba650a769f9303f48b7200fb5eaccee1

                                            SHA256

                                            c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                            SHA512

                                            b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                          • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                            Filesize

                                            13.8MB

                                            MD5

                                            0a8747a2ac9ac08ae9508f36c6d75692

                                            SHA1

                                            b287a96fd6cc12433adb42193dfe06111c38eaf0

                                            SHA256

                                            32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                            SHA512

                                            59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                            Filesize

                                            6KB

                                            MD5

                                            cac116e849e24bc1418c42715d7ac100

                                            SHA1

                                            c42d635a90b4e5bb0cd05c5122894c0a6c2f6472

                                            SHA256

                                            f5f7b459b17fb1f50b47bb6722bd3ce7f200ac2599b9610e18f5ead65f9fc054

                                            SHA512

                                            417f91f0dec1490d95031957127addf84c25e950d8b085808d16cfa969a53d50b0800237f70afd0b867f83034ec9db97422b98e6b10f7fc43ec3ab5d2bb83b84

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                            Filesize

                                            18KB

                                            MD5

                                            5dfed01773bdbe21cdf65f65ca3f192a

                                            SHA1

                                            851e56e4b313fba67c17c79eac16f22208f874ac

                                            SHA256

                                            1930b10e921f64057f88a29a9f1f07a7929ed005d6f3a0a519250410ed7d44f9

                                            SHA512

                                            b71f5a19114a1fcdc1040fd0eec60b68f269a639ea228969c6102f454fcf40f843ca4554c9f3f64ea99cc0558d26de9d09495d2e495645f737e5147c89bb89f0

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin

                                            Filesize

                                            8KB

                                            MD5

                                            388ffc2b5a9265f161b2064eeb3f9315

                                            SHA1

                                            6a7678ad7b62eefe24d14428ab631977aad55b40

                                            SHA256

                                            5e7efcac5cea0226a4d0c4a0e9fe0e591d6da75a6e021aceded354c69e4827a0

                                            SHA512

                                            3f4c65148a7e92652a1b1278cdf34dee81d4159941d2c373f868dde90f0f72b132b8b15a7e9b60bfd840c361c78ae1270c0a0edafad2cf5a40234bc9dcb95716

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            15KB

                                            MD5

                                            f740d31af23677761aed8721a254b9e5

                                            SHA1

                                            158f8aa9d9037bbc30f9fd7fc5c285683bead11f

                                            SHA256

                                            f3c4b8b7ff9a9101f1194541f422a0e24d85701f5f92c6e463db4e99542e9a9b

                                            SHA512

                                            0a7731d73503addadbb44655f5ae6dc466ed52fcd1620568e79444e96dbb8bd9fdaab737693976ba3c774e6a9b2ddf8514aa072a5892e1e0a58c1d8e369afd6d

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp

                                            Filesize

                                            5KB

                                            MD5

                                            6b2a0d7439dce5e88c29e3739cbe97db

                                            SHA1

                                            0ccc60296f67a64b71f1aac40e4d5867e446ee92

                                            SHA256

                                            82feec9171488c6f6592e203eb605c3b5f587d050a7dfc73f0e19543b2c0ec85

                                            SHA512

                                            8296b5a339ce1603ce033a8083c6b17d79bca172242e2ec3be6ed7583dcbb0e49d6666fb86fefc62df47febf0e6733153c576f99eba0b219408c9448de6985a8

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\5eaf1732-4134-4afa-bbb8-aeb5e1d019ae

                                            Filesize

                                            982B

                                            MD5

                                            e390837cbc3dada02956b55b5bb96454

                                            SHA1

                                            0eb76d10d8caae91aad9f763e7b4c5a82349f499

                                            SHA256

                                            7eba79715eb88626bb1cc01f7300714c464daa040e31cbbb2710ec26778b87dd

                                            SHA512

                                            46865a8f0139fcec22a717ac74dfade431cef7d2cc4412fcb8ed839979c5aa16717c69d45c066c56b878107d6fb7ac60ebce8aeec5d969d7f680d077f2994653

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\c60f5b5f-7bba-432b-9b3f-b76f71b4a989

                                            Filesize

                                            25KB

                                            MD5

                                            3f03c57fff010b0195bc80bc39da3b17

                                            SHA1

                                            3aa8bfe692f72c10b594888ee69e4a00f9441a80

                                            SHA256

                                            c08a5c3371ef7b644dd58001d554c875ad2a49139f3512d1d963087dd273bd12

                                            SHA512

                                            f7e8912f0c0fa3429b8c5d0740606f000dd967ee77d9884ce4fe7a21ab8656ddd6050e70165964489a7915d4b9bac223821e1e35d4ebfb31834b6d81cef1b6e8

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\eaf321a6-01af-4e2f-9d94-340c68df519d

                                            Filesize

                                            671B

                                            MD5

                                            a5719e668a5dabe9051973958b730d7b

                                            SHA1

                                            0360e5fb8fc1453aae1897250bbbbce41baac8cb

                                            SHA256

                                            9edc915baf334d0281acf671144a74f6cc28da24140e07bb8b596d0209d29cc6

                                            SHA512

                                            ef3fcdfcedcd80b9be2fd0a9795e0b59a356ca3f7e9478727d7c68e7dea8728501fcf8429c5c19973b61c7b2857b9870c124993a90901507660d289c1edf45f5

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                            Filesize

                                            1.1MB

                                            MD5

                                            842039753bf41fa5e11b3a1383061a87

                                            SHA1

                                            3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                            SHA256

                                            d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                            SHA512

                                            d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                            Filesize

                                            116B

                                            MD5

                                            2a461e9eb87fd1955cea740a3444ee7a

                                            SHA1

                                            b10755914c713f5a4677494dbe8a686ed458c3c5

                                            SHA256

                                            4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                            SHA512

                                            34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                            Filesize

                                            372B

                                            MD5

                                            bf957ad58b55f64219ab3f793e374316

                                            SHA1

                                            a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                            SHA256

                                            bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                            SHA512

                                            79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                            Filesize

                                            17.8MB

                                            MD5

                                            daf7ef3acccab478aaa7d6dc1c60f865

                                            SHA1

                                            f8246162b97ce4a945feced27b6ea114366ff2ad

                                            SHA256

                                            bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                            SHA512

                                            5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                            Filesize

                                            11KB

                                            MD5

                                            ea58f226b46e9f39bd61a0b4de2f24a6

                                            SHA1

                                            12b096c330d71d5aabaa646c7fac47c48122453f

                                            SHA256

                                            da551b130459b3ef7e62dc10c24db0b1f44701daeb9804268685b980e4850bc5

                                            SHA512

                                            7e0c3d3f6bc06c9364cf5d6ba33f93b17c4e7ff49e8c8ec1259059d422b86062a8f86337dec91264b708ec2ec9acd232161da9b757323761f54c3244c1eed09c

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs-1.js

                                            Filesize

                                            15KB

                                            MD5

                                            577b551d209bd23f8f6f1e673cb4acb5

                                            SHA1

                                            443d3cfb3f36ea0435d9656da214d4385a723410

                                            SHA256

                                            2080c84527cd787c71dee7e433afc1b2253dfd3edc431225e97504b183c6126d

                                            SHA512

                                            c42c68a479968beb141d764b13b1ec43258b1a1041dd3e453cf2b5e47c0345bd5fd93277ab567d096b7f4106c4f064ceac44eb1ba116da1e79cce8ea23b62a99

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                                            Filesize

                                            15KB

                                            MD5

                                            b65c6e3d6a53ce4d865befeaccf6127a

                                            SHA1

                                            957c2916a379538a9ece28e887886dc1842ec95a

                                            SHA256

                                            c5d89a9856bb0b5f7d8c32fe1693cb9464d01503fabf9b8f3d7c8d04052545f7

                                            SHA512

                                            86cb18a64064c5a9c02ac08746f81cf80a25e668e0ede041e5ed9943b9871e89e5e89feef30fe76ee5f680ce4f0041431a064cb45b4659acb2b1a041d9e945b3

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\prefs.js

                                            Filesize

                                            11KB

                                            MD5

                                            66961c9d65b623123f7b126a1b3ddccd

                                            SHA1

                                            e6cc5981370f32372256d85ec592c76e1fbd6a76

                                            SHA256

                                            ab993904b4c036d6dad9c8fcb3780d9c31c5a46f561e6ce69edc20aa06e839d5

                                            SHA512

                                            8f24833454789957a0b783faa95ff06608a6c68d3446ab1b4625639719294679384e96eba1fe8052b58331244da721cf3e560737a4c15aa2f277ecdd6b75bdff

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                            Filesize

                                            912KB

                                            MD5

                                            d44a96aca645f13470e742dced806d82

                                            SHA1

                                            0372464ece785b15cc1000fefa177b7a72da748d

                                            SHA256

                                            7b566f8df7af3272e27fa0e8c3603891d77a361e1b8802563f9c99114aa2b648

                                            SHA512

                                            76c641f5888dc8a463f99e5a7d539c24b79d3eeb94dec78367576225b46c4842c0c04b1bb798a138ebd0e9c5d2255215d87c772ea85fc2da695cc4f926ca1971

                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                            Filesize

                                            9.5MB

                                            MD5

                                            69f7a70869a286d5bc8e8dda7017bb79

                                            SHA1

                                            5c0931744522a0f77ed314603384cff00a734d40

                                            SHA256

                                            80b8c067b6206d0c8fcce24c6bae0dec31fa6f83ff8ee3e6a3c2461b6fd0cdbe

                                            SHA512

                                            2c19fcf32bd37b417f69d366750e86b3d262eb89968b93d03f6c162484452fc9c33219b78897c58bcc2097db3a32443d635f26641d23386bfb9c7b10f3fba51b

                                          • memory/380-2875-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/380-2874-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/2596-389-0x00000000003B0000-0x0000000000A4F000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/2596-542-0x00000000003B0000-0x0000000000A4F000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/2596-102-0x00000000003B0000-0x0000000000A4F000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/2596-115-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                            Filesize

                                            972KB

                                          • memory/2596-477-0x00000000003B0000-0x0000000000A4F000-memory.dmp

                                            Filesize

                                            6.6MB

                                          • memory/2880-2878-0x0000000000C10000-0x0000000000C22000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/3428-2184-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-1427-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-547-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-550-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                            Filesize

                                            10.4MB

                                          • memory/3428-2400-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-858-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-68-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-590-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-148-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3428-105-0x0000000000330000-0x0000000000F82000-memory.dmp

                                            Filesize

                                            12.3MB

                                          • memory/3512-47-0x0000000000500000-0x0000000000566000-memory.dmp

                                            Filesize

                                            408KB

                                          • memory/3512-48-0x00000000026D0000-0x00000000026D6000-memory.dmp

                                            Filesize

                                            24KB

                                          • memory/3512-559-0x000000001C3A0000-0x000000001C416000-memory.dmp

                                            Filesize

                                            472KB

                                          • memory/3588-86-0x0000000000EF0000-0x0000000001394000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/3588-107-0x0000000000EF0000-0x0000000001394000-memory.dmp

                                            Filesize

                                            4.6MB

                                          • memory/4212-182-0x0000000000BC0000-0x0000000000E72000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4212-570-0x0000000000BC0000-0x0000000000E72000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4212-567-0x0000000000BC0000-0x0000000000E72000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4212-185-0x0000000000BC0000-0x0000000000E72000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4212-186-0x0000000000BC0000-0x0000000000E72000-memory.dmp

                                            Filesize

                                            2.7MB

                                          • memory/4440-903-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/4440-889-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5032-1-0x00000000772E4000-0x00000000772E6000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/5032-18-0x0000000000380000-0x0000000000833000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5032-4-0x0000000000380000-0x0000000000833000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5032-0-0x0000000000380000-0x0000000000833000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5032-3-0x0000000000380000-0x0000000000833000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5032-2-0x0000000000381000-0x00000000003AF000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/5072-49-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-67-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-16-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-855-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-20-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-21-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-22-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-589-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-50-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-51-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-1426-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-546-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2183-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-19-0x00000000003E1000-0x000000000040F000-memory.dmp

                                            Filesize

                                            184KB

                                          • memory/5072-70-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2885-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2882-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2851-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2860-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-69-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2867-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2870-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-147-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5072-2879-0x00000000003E0000-0x0000000000893000-memory.dmp

                                            Filesize

                                            4.7MB

                                          • memory/5200-594-0x0000000000400000-0x000000000045B000-memory.dmp

                                            Filesize

                                            364KB

                                          • memory/5200-595-0x0000000000400000-0x000000000045B000-memory.dmp

                                            Filesize

                                            364KB

                                          • memory/5480-2852-0x0000000000C10000-0x0000000000C22000-memory.dmp

                                            Filesize

                                            72KB

                                          • memory/5480-2853-0x0000000072B40000-0x0000000072C74000-memory.dmp

                                            Filesize

                                            1.2MB