Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2024 22:36

General

  • Target

    5827e8edc4dd0e49567bc54fc1d21089dbdb5274c9b30b78efa008d8bff46256.exe

  • Size

    1.7MB

  • MD5

    28310e15ba4442af4bdcc9e319111527

  • SHA1

    2d4e82da3419c161d6fb965487a887c99c01c377

  • SHA256

    5827e8edc4dd0e49567bc54fc1d21089dbdb5274c9b30b78efa008d8bff46256

  • SHA512

    5c8b2eeab392e1c5b9cda1e9c1418a1291fc3149c1a04e42183f42ff15c5eababd2650875c644fffb6553fd5ccab6722ee74b41343f9a050af558fea980cfb28

  • SSDEEP

    24576:bVpf7Ep73Z0fa6l5kAmrUU7efuNwYA5mWnFPb/fK5AMEpoxxPhblwRpbvpkvz4Ig:JpM107l5kAc1eNEUaAMrxP5lJKPc6bb

Malware Config

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 19 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\5827e8edc4dd0e49567bc54fc1d21089dbdb5274c9b30b78efa008d8bff46256.exe
        "C:\Users\Admin\AppData\Local\Temp\5827e8edc4dd0e49567bc54fc1d21089dbdb5274c9b30b78efa008d8bff46256.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:584
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"
          3⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2668
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6eb9758,0x7fef6eb9768,0x7fef6eb9778
            4⤵
              PID:2236
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              4⤵
                PID:2620
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:2
                4⤵
                  PID:1952
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1524 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:8
                  4⤵
                    PID:680
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:8
                    4⤵
                      PID:1872
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:1
                      4⤵
                      • Uses browser remote debugging
                      PID:1704
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2320 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:1
                      4⤵
                      • Uses browser remote debugging
                      PID:2784
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1280 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:2
                      4⤵
                        PID:864
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2256 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:1
                        4⤵
                        • Uses browser remote debugging
                        PID:2260
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3580 --field-trial-handle=1248,i,8792594800711929328,10547616813647212372,131072 /prefetch:8
                        4⤵
                          PID:2588
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsKECBFBAEBK.exe"
                        3⤵
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        PID:2280
                        • C:\Users\Admin\DocumentsKECBFBAEBK.exe
                          "C:\Users\Admin\DocumentsKECBFBAEBK.exe"
                          4⤵
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Loads dropped DLL
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of FindShellTrayWindow
                          PID:2364
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                            5⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1568
                            • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe
                              "C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"
                              6⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              PID:812
                              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2608
                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                  8⤵
                                    PID:3588
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                    8⤵
                                    • Suspicious use of NtCreateUserProcessOtherParentProcess
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3676
                              • C:\Users\Admin\AppData\Local\Temp\1009132001\2bcf88a251.exe
                                "C:\Users\Admin\AppData\Local\Temp\1009132001\2bcf88a251.exe"
                                6⤵
                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                • Checks BIOS information in registry
                                • Executes dropped EXE
                                • Identifies Wine through registry keys
                                • Loads dropped DLL
                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                • System Location Discovery: System Language Discovery
                                • Checks processor information in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1980
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
                                  7⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3824
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6bd9758,0x7fef6bd9768,0x7fef6bd9778
                                    8⤵
                                      PID:3836
                                    • C:\Windows\system32\ctfmon.exe
                                      ctfmon.exe
                                      8⤵
                                        PID:3960
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1116 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:2
                                        8⤵
                                          PID:4040
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:8
                                          8⤵
                                            PID:4048
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1488 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:8
                                            8⤵
                                              PID:3144
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1600 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:1
                                              8⤵
                                              • Uses browser remote debugging
                                              PID:3428
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2200 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:1
                                              8⤵
                                              • Uses browser remote debugging
                                              PID:3452
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1584 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:2
                                              8⤵
                                                PID:112
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1244 --field-trial-handle=1376,i,5930636073724506734,4037017916620974246,131072 /prefetch:1
                                                8⤵
                                                • Uses browser remote debugging
                                                PID:3772
                                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                              "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:3736
                                            • C:\Windows\SysWOW64\schtasks.exe
                                              "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3748
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 964
                                              7⤵
                                              • Loads dropped DLL
                                              • Program crash
                                              PID:3328
                                          • C:\Users\Admin\AppData\Local\Temp\1009137001\6e12df2cb9.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009137001\6e12df2cb9.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Modifies system certificate store
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2600
                                          • C:\Users\Admin\AppData\Local\Temp\1009138001\bdb57ae8ac.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009138001\bdb57ae8ac.exe"
                                            6⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2432
                                          • C:\Users\Admin\AppData\Local\Temp\1009139001\127ceab6c2.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1009139001\127ceab6c2.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:324
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM firefox.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2988
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM chrome.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1004
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM msedge.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:1616
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM opera.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2572
                                            • C:\Windows\SysWOW64\taskkill.exe
                                              taskkill /F /IM brave.exe /T
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:808
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                              7⤵
                                                PID:2848
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                  8⤵
                                                  • Checks processor information in registry
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2480
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.0.444958528\1802417431" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1136 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f496f6a2-41d5-4fbd-ade6-0be397b6d004} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 1328 107d6558 gpu
                                                    9⤵
                                                      PID:2036
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.1.2059237413\1821574060" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e75d94f3-d04e-4960-9805-47537c7d5140} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 1528 e72458 socket
                                                      9⤵
                                                        PID:2596
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.2.79690578\793803740" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {259b18a3-8fca-4694-af1a-83818174c1d7} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 2084 18e8e458 tab
                                                        9⤵
                                                          PID:2936
                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.3.1805981618\1521226002" -childID 2 -isForBrowser -prefsHandle 2904 -prefMapHandle 2900 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0dff2bff-483b-401e-8a12-9a0798338b00} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 2916 1bb24558 tab
                                                          9⤵
                                                            PID:2488
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.4.2088819935\1619199245" -childID 3 -isForBrowser -prefsHandle 3816 -prefMapHandle 3760 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {004d3cc2-b7c2-4dab-bb29-96308d54187c} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 3828 1be1d458 tab
                                                            9⤵
                                                              PID:2236
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.5.901038620\1858018146" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a213cb5d-94fe-4902-9290-535c8df96bd9} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 3936 1eb31c58 tab
                                                              9⤵
                                                                PID:2400
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2480.6.1038317425\1337576233" -childID 5 -isForBrowser -prefsHandle 4156 -prefMapHandle 4160 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e784b69f-f59a-4973-a01d-9ac61e9d7a33} 2480 "\\.\pipe\gecko-crash-server-pipe.2480" 4148 20a53858 tab
                                                                9⤵
                                                                  PID:1536
                                                          • C:\Users\Admin\AppData\Local\Temp\1009140001\d2649e2a49.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\1009140001\d2649e2a49.exe"
                                                            6⤵
                                                            • Modifies Windows Defender Real-time Protection settings
                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                            • Checks BIOS information in registry
                                                            • Executes dropped EXE
                                                            • Identifies Wine through registry keys
                                                            • Windows security modification
                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3204
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                    2⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:3116
                                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                  1⤵
                                                    PID:1004
                                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                    1⤵
                                                      PID:3344

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      40B

                                                      MD5

                                                      44691fdf709576c5467bd86b9d95cecb

                                                      SHA1

                                                      9c0e49c662f20cdd89217f1bb4b4ba701e659697

                                                      SHA256

                                                      bbeef7deae86cbdb634c26982101647e319bb03dce941d124f0ab0edc8a76de9

                                                      SHA512

                                                      e52fb7f7091ed7a21944c629081fa5069f47fc076911101e20fdcc183c35b7b460fbbfac56f1f91052b1d35a35e66ce2dafce70349ed34ca6f16ba1e1f1fabdf

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000009.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      979c29c2917bed63ccf520ece1d18cda

                                                      SHA1

                                                      65cd81cdce0be04c74222b54d0881d3fdfe4736c

                                                      SHA256

                                                      b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53

                                                      SHA512

                                                      e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\CURRENT

                                                      Filesize

                                                      16B

                                                      MD5

                                                      aefd77f47fb84fae5ea194496b44c67a

                                                      SHA1

                                                      dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                      SHA256

                                                      4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                      SHA512

                                                      b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                      Filesize

                                                      136B

                                                      MD5

                                                      4f736c88ea4088c19f1fc9c813633352

                                                      SHA1

                                                      bbcee2afaacb31584d2a5fe845e87d00eb7f5f5f

                                                      SHA256

                                                      e4ddbfd434ef0ef8c542e97ad67fdd0d5b2221b7d55bdc24560e9b753d9b630e

                                                      SHA512

                                                      05992d9d1ed914a8aaf04209a38de65cb1fe01dc2984d0f9f659c70ca8351631946404b84c00690c429fb2bd07cad92364b877afc0b71e91b98aa046058674dc

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\MANIFEST-000006

                                                      Filesize

                                                      50B

                                                      MD5

                                                      78c55e45e9d1dc2e44283cf45c66728a

                                                      SHA1

                                                      88e234d9f7a513c4806845ce5c07e0016cf13352

                                                      SHA256

                                                      7b69a2bee12703825dc20e7d07292125180b86685d2d1b9fd097df76fc6791ec

                                                      SHA512

                                                      f2ad4594024871286b98a94223b8e7155c7934ef4ebb55f25a4a485a059f75b572d21bc96e9b48ed394be8a41fe0208f7bfb6e28a79d75640c5b684f0c848fe3

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG

                                                      Filesize

                                                      136B

                                                      MD5

                                                      170aea0033ccc77a1842fbcfa41fd6e8

                                                      SHA1

                                                      446a2a756e0e0fa86765764314d5e7bc7b75da54

                                                      SHA256

                                                      ac6907297f7e7ba72e8047aa271c2df9816e80c418682d253a108020080583b6

                                                      SHA512

                                                      1d4620b26073ffb3bb65942590f55b1f3d3b2b8274dffe49744ab7998503ec46875c704e3e0acff26819f56088bc0e3326add4a2b66b85f3640fd9792d7e593c

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\MANIFEST-000007

                                                      Filesize

                                                      107B

                                                      MD5

                                                      22b937965712bdbc90f3c4e5cd2a8950

                                                      SHA1

                                                      25a5df32156e12134996410c5f7d9e59b1d6c155

                                                      SHA256

                                                      cad3bbec41899ea5205612fc1494fa7ba88847fb75437a2def22211a4003e2eb

                                                      SHA512

                                                      931427ad4609ab4ca12b2ee852d4965680f58602b00c182a2d340acf3163d888be6cfad87ca089f2b47929ddfa66be03ab13a6d24922397334d6997d4c8ede3b

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      18e723571b00fb1694a3bad6c78e4054

                                                      SHA1

                                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                      SHA256

                                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                      SHA512

                                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000008.ldb

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      21d9a3fd61cf38ef9f6c66fb0d767c1a

                                                      SHA1

                                                      f134671454df89b7e099780ab8a310b3ea7328b3

                                                      SHA256

                                                      867b4518a209d7b95472fadcbc61151eac01654cd886af5ce55c966e99b3813d

                                                      SHA512

                                                      0a6039e562784ca87ad23ca733ff994c72197a43851e82d1aa2b26a16becaea9e9032dcae984e58249d49af8da00fea72434e76c2bf944f98cf7fa3c248afc77

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000009.log

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      627fcfe7e0c744d8fec30cdd9b01f17a

                                                      SHA1

                                                      049cc09dbeb47b2187c5fb1f1094a8a6e7db1bc9

                                                      SHA256

                                                      ea0c7371f4f2f070be1dfe18ce2d8ede564e832f0aa6b7bbbd368e51c00affeb

                                                      SHA512

                                                      73279fafa0d1d1d03ffd4045cbaca50d10d398c797acd48b3cbaa218f3769e514e6cb27057a55ab93faa032a1b04f5f4708ab78108d967bc57d380b5e622f916

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG

                                                      Filesize

                                                      250B

                                                      MD5

                                                      47b1b65cd98fba0ed89b86a938995d8b

                                                      SHA1

                                                      477ef3ce2a2387c7736dec3ed4e079e10fa4c891

                                                      SHA256

                                                      43cf3162c1a86fd706e4ad49375f594af97ab8e9d4704a4128ef7f8de9d59e89

                                                      SHA512

                                                      4e5ffca38cd1f16e6f28228741c841d17ade2f6c763be2b237eed0df8be77db6f9a608f5b6ab9f18e64d97250c89c4533a96c967e6a94af228aef111b1b97a88

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\MANIFEST-000007

                                                      Filesize

                                                      250B

                                                      MD5

                                                      d89c771f339d7d96040098a218521028

                                                      SHA1

                                                      8293720bb676440fa860b840c1e9ffcb92cb8a27

                                                      SHA256

                                                      86e1b92b3b4f5aa4ddc6190987589c86e9bd40795082413472a5ec5bf6b2f719

                                                      SHA512

                                                      6fd5d0631c5544112af4f976e48a61201f027b6e464f11fcaf818f2e92bac501a91a2135be89552fc0c15e3c7a4e9e774fe2ec75a9742375f164f1e218584158

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\000009.log

                                                      Filesize

                                                      57B

                                                      MD5

                                                      50e0a00e9e3eca5dd3e80d3e6e8b8eb6

                                                      SHA1

                                                      f0afa409c7ab927938c8dedf7e57c0f355103cba

                                                      SHA256

                                                      7c820f099ace6ab1f6694f5b610412ce0cd81c64a500bc8558ae5ff9042a9c8c

                                                      SHA512

                                                      7834f7052e6d21e6aba4b5445b555103bfb9f1e04457a5aa7363918e97e0d7dfd0e08a9136c377600fd3a1c8818296b76e9eb09c7217b4e8b9229bb81689a79e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG

                                                      Filesize

                                                      249B

                                                      MD5

                                                      114d52849c03db943c2de6b5c57fa662

                                                      SHA1

                                                      c831b4bc93587353dd1379eb2f62585804f9fc5b

                                                      SHA256

                                                      58ab7483f820e9d86c37ea271a1db881b8e9d22b7f38662f910e276623880ea5

                                                      SHA512

                                                      2dcb73ef2d0488c637bb5cfc786112d8a253197942fa76238f7ed8f670f72ae7eef7a63c270d5487aed36dbaf35a40dfb9faf1407b138ce6accbde9618100ada

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\MANIFEST-000007

                                                      Filesize

                                                      98B

                                                      MD5

                                                      1c0c23649f958fa25b0407c289db12da

                                                      SHA1

                                                      5f6b10cd5a39fe8c30353bcf4cd4e4a60ef35574

                                                      SHA256

                                                      d5134b804a775cfb79c6166d15b5721d38ffc2da11948a6c1263595d6c2941cf

                                                      SHA512

                                                      b691e882018833a108bd286bc76c55a140d00d5a266617a3a381af1ceff01aefaef17acef29d14dec931d7051455726cde8974cd04cc07302f1c3cc452fe2f52

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000009.log

                                                      Filesize

                                                      34B

                                                      MD5

                                                      fe62c64b5b3d092170445d5f5230524e

                                                      SHA1

                                                      0e27b930da78fce26933c18129430816827b66d3

                                                      SHA256

                                                      1e1a9ca70503efd8c607f9bc7131f08aba0476d75f2586dadb4da5485a5315d4

                                                      SHA512

                                                      924daccfbfb0c0464b4c5fd769e01a8f2e96fe28b635aa27ab4cd91766b05b03bbf941af14c017436107673f01bad815ce1fac2a649e745c76b3c736994b4fd2

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000010.dbtmp

                                                      Filesize

                                                      16B

                                                      MD5

                                                      60e3f691077715586b918375dd23c6b0

                                                      SHA1

                                                      476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                      SHA256

                                                      e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                      SHA512

                                                      d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG

                                                      Filesize

                                                      249B

                                                      MD5

                                                      2fd0c58f16ed59b537a75af74b86cf84

                                                      SHA1

                                                      86bac62df5e26d55facb3de15e788cc4f6a0a74c

                                                      SHA256

                                                      207730e9e7abb820db1175cecae7a756bd47d3af0ae80d0520b4bc7aaea29bf3

                                                      SHA512

                                                      9e94c2a8c4e7c6958a2e5c2b10bddcf98e9de9cc33a0f6fe5d7ca494affec5ec2bcd35f5c8d2d0f2e2353d87985a42b9cf6027785b032f80da966b2be3508060

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000007

                                                      Filesize

                                                      118B

                                                      MD5

                                                      9ce0de297ae8307289b9a8b85d71344d

                                                      SHA1

                                                      111ca14ee7455b171f403e7bbb95159179e8bf24

                                                      SHA256

                                                      6cf9e355c58cef858e7dc1f0ca7e9a7df63d9b9f55aa0bb0b8e9b47d2976c96c

                                                      SHA512

                                                      d2c96cdc086da1fad94e1e67664306115035f4b76d9c9c80b80cd94e8337ccb637aa4fbe1dc6018b47d46d7011a73245898af821c2fe1b82cdddb8d59196ae0a

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                      Filesize

                                                      14B

                                                      MD5

                                                      9eae63c7a967fc314dd311d9f46a45b7

                                                      SHA1

                                                      caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                      SHA256

                                                      4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                      SHA512

                                                      bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                      Filesize

                                                      86B

                                                      MD5

                                                      961e3604f228b0d10541ebf921500c86

                                                      SHA1

                                                      6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                      SHA256

                                                      f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                      SHA512

                                                      535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                                      Filesize

                                                      2B

                                                      MD5

                                                      99914b932bd37a50b983c5e7c90ae93b

                                                      SHA1

                                                      bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                      SHA256

                                                      44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                      SHA512

                                                      27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp

                                                      Filesize

                                                      26KB

                                                      MD5

                                                      6761f6fdd3c27fa70e147b97f69a47b4

                                                      SHA1

                                                      60c0d5041c34ec8e9a2d881578495d1decd8d255

                                                      SHA256

                                                      6c4a55e365ef0a946e4b7b999bc92335ef1d6cdf78407dc71763778cd8f8a09b

                                                      SHA512

                                                      55d0d48e6343c65a244a23a51e2b1c27ee10bd5f21057c70d4b1063af28ee8bf4017cc6e753afbf099f76b2861acc9579547f6602ca1daab694b48b8af84e5a1

                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                      Filesize

                                                      13KB

                                                      MD5

                                                      f99b4984bd93547ff4ab09d35b9ed6d5

                                                      SHA1

                                                      73bf4d313cb094bb6ead04460da9547106794007

                                                      SHA256

                                                      402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                                      SHA512

                                                      cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                                                    • C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe

                                                      Filesize

                                                      932KB

                                                      MD5

                                                      96a7b754ca8e8f35ae9e2b88b9f25658

                                                      SHA1

                                                      ed24a27a726b87c1d5bf1da60527e5801603bb8e

                                                      SHA256

                                                      21d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50

                                                      SHA512

                                                      facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745

                                                    • C:\Users\Admin\AppData\Local\Temp\1009132001\2bcf88a251.exe

                                                      Filesize

                                                      4.2MB

                                                      MD5

                                                      e3f5abc2332ea769c91f7c6f2a5a664a

                                                      SHA1

                                                      2969a201926786c2e4d03f215077d2abec517dec

                                                      SHA256

                                                      6bf3521dbb4d8610035627fd1ffba23169aaba4c7ed723522a1a73386edf5b69

                                                      SHA512

                                                      6a2f821451483ad5781b761bd9f462fcbf6239c1d6260d2af02f128680588c56fb4b03ad199a01334ce50d4a351393a2dd69abd345fe949434c5733078949f2a

                                                    • C:\Users\Admin\AppData\Local\Temp\1009137001\6e12df2cb9.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      ae35cd7c9be6be3a150f903ddd1e411d

                                                      SHA1

                                                      8ed830ee8e571e05afb58dd8755936eba832b72b

                                                      SHA256

                                                      8be6a98bd5d89cf4adc715b3f0cd7914a47812086c13098f8bdb3fda1094b812

                                                      SHA512

                                                      f93f3d4da6017b4e3c7bb04c973c4237deb81dc4164ff494a833f6f6403b66b90476fef5d52dc2a46b1b82a3e45bb07e970df139c08e2dcf5f7294d87f35e6f2

                                                    • C:\Users\Admin\AppData\Local\Temp\1009138001\bdb57ae8ac.exe

                                                      Filesize

                                                      1.7MB

                                                      MD5

                                                      78885f880c86755dd80acc745342d163

                                                      SHA1

                                                      6ebce6930a242459b1d7d76332ebfab51716f43d

                                                      SHA256

                                                      c8a3e4e3cd7431d71f9c61bb9d0b10745da85359c33745d1b9773b49efbb581e

                                                      SHA512

                                                      e2dadd8e11d2d89eca2a2689dfb7c0d4328a383c10904b8efc3757878b2c2d8338b7148b0ce664e3d0a0f1f3c96265a3d2dc5cbfaf69a6eb5242871f9c0e6837

                                                    • C:\Users\Admin\AppData\Local\Temp\1009139001\127ceab6c2.exe

                                                      Filesize

                                                      901KB

                                                      MD5

                                                      12fdb6a5204864a29226f1b1ac11af27

                                                      SHA1

                                                      b18f0ebd1c71745d12c5ac497159e92093d47517

                                                      SHA256

                                                      4dfdfa7f9aa93fee0734faf0d4c5011cf7f53b9ea9aac036ad8ad8817824408d

                                                      SHA512

                                                      24d0ac723d0e6f7b6337615224d157036eba24b713f58061b1ccfbd02339219f834f6a4bcd5ba650073eb7c50a31457377377fddf5d8cb51936d7a1be6661a1d

                                                    • C:\Users\Admin\AppData\Local\Temp\1009140001\d2649e2a49.exe

                                                      Filesize

                                                      2.7MB

                                                      MD5

                                                      d821ac834f35b06fb131da343b7e6c9c

                                                      SHA1

                                                      d473013e11fd925375dafa82db9f3964f1280900

                                                      SHA256

                                                      e9e4689b18e965bb2559fb88fc7c2b22e59e672bf26d40355dab04117f2df18e

                                                      SHA512

                                                      1de630ff3cfbab998c95c624978e47f72c0f38452321b640e6120025f86351169a4e86255c94e4caab8b3b47e8c0af95edffd850736ed78f6c644c3b0eb85fb9

                                                    • C:\Users\Admin\AppData\Local\Temp\Cab6FE5.tmp

                                                      Filesize

                                                      70KB

                                                      MD5

                                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                                      SHA1

                                                      1723be06719828dda65ad804298d0431f6aff976

                                                      SHA256

                                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                      SHA512

                                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe

                                                      Filesize

                                                      1.1MB

                                                      MD5

                                                      2354e800eefc681a7d60f3b6b28acfd9

                                                      SHA1

                                                      10b6a3d9d2283b5f98c9924fa1fca6da79edb720

                                                      SHA256

                                                      d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3

                                                      SHA512

                                                      0395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354

                                                    • C:\Users\Admin\AppData\Local\Temp\Tar7016.tmp

                                                      Filesize

                                                      181KB

                                                      MD5

                                                      4ea6026cf93ec6338144661bf1202cd1

                                                      SHA1

                                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                                      SHA256

                                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                      SHA512

                                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                      Filesize

                                                      442KB

                                                      MD5

                                                      85430baed3398695717b0263807cf97c

                                                      SHA1

                                                      fffbee923cea216f50fce5d54219a188a5100f41

                                                      SHA256

                                                      a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                      SHA512

                                                      06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                      Filesize

                                                      8.0MB

                                                      MD5

                                                      a01c5ecd6108350ae23d2cddf0e77c17

                                                      SHA1

                                                      c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                      SHA256

                                                      345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                      SHA512

                                                      b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin

                                                      Filesize

                                                      2KB

                                                      MD5

                                                      7e626b11a66047eba123a3faa32f4857

                                                      SHA1

                                                      1c3c2583faff4ab1417b580100687531029ead9f

                                                      SHA256

                                                      c76afd192fdd4af9fc908098061317d88204d4d18954fd31f72d46e1223eba62

                                                      SHA512

                                                      c2eb6f6880ca62aa0e2e0b9128989aca9a1a2cbb3916bbffe2be38493bab440f9ce3f6a8c1ee6f55619fb52ae7b77d8b6fdbb0422838190a1a6f09eee9d68c5a

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\3a5afd0a-0420-49b9-a33b-f0cd0bfda2ba

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      bfa3782912ad786ab6b64d18a093d9ab

                                                      SHA1

                                                      9af618adb168beb10d34bfc41db917b08f74dc83

                                                      SHA256

                                                      c8c222f630c23618b05d7b116a44c3139f9dc4ec78d7f730e6e97e3ba6284ef3

                                                      SHA512

                                                      f7a38d639b3f2196b7e18ec3e4636847294c8588741c4b0697ab128d644f3cf29c64a06cd41caabc7aafa028d7a8c13af8003442614ac131ec2e1e8602ed0ea8

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\e1eb13bb-e5ea-4d62-9e06-dd64d88563e7

                                                      Filesize

                                                      745B

                                                      MD5

                                                      50c66ef61dc9c654d1318771f1d0e26c

                                                      SHA1

                                                      6cd1fbb99245802f23086f654f3a0ebaa349a4bd

                                                      SHA256

                                                      93cd0ccf902bec3a942c1d662ac602a4db680e78848433c0508173578ca94349

                                                      SHA512

                                                      79ae69114316e608f3eb745d9aabbf65effcdfbb52de35fbf217a6330ddd87fe7108f04a04ed123ffd533aedd1360c463e62083e853352fc43bdad950e483832

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                      Filesize

                                                      997KB

                                                      MD5

                                                      fe3355639648c417e8307c6d051e3e37

                                                      SHA1

                                                      f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                      SHA256

                                                      1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                      SHA512

                                                      8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                      Filesize

                                                      116B

                                                      MD5

                                                      3d33cdc0b3d281e67dd52e14435dd04f

                                                      SHA1

                                                      4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                      SHA256

                                                      f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                      SHA512

                                                      a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                      Filesize

                                                      479B

                                                      MD5

                                                      49ddb419d96dceb9069018535fb2e2fc

                                                      SHA1

                                                      62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                      SHA256

                                                      2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                      SHA512

                                                      48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                      Filesize

                                                      372B

                                                      MD5

                                                      8be33af717bb1b67fbd61c3f4b807e9e

                                                      SHA1

                                                      7cf17656d174d951957ff36810e874a134dd49e0

                                                      SHA256

                                                      e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                      SHA512

                                                      6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                      Filesize

                                                      11.8MB

                                                      MD5

                                                      33bf7b0439480effb9fb212efce87b13

                                                      SHA1

                                                      cee50f2745edc6dc291887b6075ca64d716f495a

                                                      SHA256

                                                      8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                      SHA512

                                                      d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      688bed3676d2104e7f17ae1cd2c59404

                                                      SHA1

                                                      952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                      SHA256

                                                      33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                      SHA512

                                                      7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                      Filesize

                                                      1KB

                                                      MD5

                                                      937326fead5fd401f6cca9118bd9ade9

                                                      SHA1

                                                      4526a57d4ae14ed29b37632c72aef3c408189d91

                                                      SHA256

                                                      68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                      SHA512

                                                      b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      44fee8347b993b2e8c399b020f385bcb

                                                      SHA1

                                                      811c6901054ec884a9cf658cda7e56702502d244

                                                      SHA256

                                                      7ac634fbe91cc5c8f73366af2c8c5fd8109b8a4596f96949bbf9e4ac332d101a

                                                      SHA512

                                                      95011bbac3c139a7eb1bbd16942880dc407bcf65e041e925b7af10e3c978d2d6ce1a509600919457b6fe4b8d85bf5d0d63be5ac8ee1300c804d3a39df2847015

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                      Filesize

                                                      6KB

                                                      MD5

                                                      ff5595cfa7e5d5699dcd33ec1a19ea35

                                                      SHA1

                                                      c04ea2e3c62f59df8622f15725ad0dd039c227ea

                                                      SHA256

                                                      be9361f498f9cab0716902a4756fddd6612d9ae46503c72253cd51a89755d663

                                                      SHA512

                                                      2e121804793d05a7ba5a5907603b4145b3fa9ec30933d6fd4d76269fe14adeac889bddc8756283bba1e7812a177f1192073943c76e91ef465db8f72351ea6a5f

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      ff2e8dac54596729829be7ed23455900

                                                      SHA1

                                                      db8a39afaa8e6561831f2acdceea5385654c221e

                                                      SHA256

                                                      79d05b520efe74691a29c6631f6e9b5d30e2f55ffb68187f39f5acca2da56def

                                                      SHA512

                                                      535cd844d700d628453d83dd78a8985ec1e310ca261e6ecfb8c14ad0a06e32c1856db789182846ecfae225205ded4ace84a434d281de7ce544c5d3fe81587038

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                                      Filesize

                                                      7KB

                                                      MD5

                                                      055e1b2ff3b67809b5b1b25204d28990

                                                      SHA1

                                                      28e2377fd746679ad2a56e0cdfa878402c09252a

                                                      SHA256

                                                      2126355cc6f6f36bb957f44143dfab06a55fa16c3cc9b580b7d8b2c76e9bb083

                                                      SHA512

                                                      9941a8ddcc1d033087a25e9625221e5b1337a7021926db760bbc5a9769d005dc00789858173c7f10157e747d9a90cc5d0680e22583c99d715b828069aa37aea8

                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4

                                                      Filesize

                                                      4KB

                                                      MD5

                                                      2800e6373836de3182af7b84724e4a56

                                                      SHA1

                                                      1232f3af4eddd316a115b4b649c231b105be34d3

                                                      SHA256

                                                      da1a998e1c8cebbafa69128c59c3c975c97b6e50f78a0b3a5418af5ecf7a1fb5

                                                      SHA512

                                                      9f9358db93fe6dc0a25dc9c877df5e73e4f8e0be493398d834641f2d6e081672e7e714bcbf15dff8d8c2ace1d7fbd0e3920b7ef538df797c8dce343001f9f754

                                                    • \??\pipe\crashpad_2668_TEXXQOWQCPZAJMEM

                                                      MD5

                                                      d41d8cd98f00b204e9800998ecf8427e

                                                      SHA1

                                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                      SHA256

                                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                      SHA512

                                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                    • \ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • \ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • \Users\Admin\DocumentsKECBFBAEBK.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      0198788313d3bda571d5323d4141b15a

                                                      SHA1

                                                      2da003d7ad837ef616fc7d1b72d3db800a7e4fce

                                                      SHA256

                                                      ecfea9c41c536acc9389d572abce18ae75e850f22ef85ce9ed04d105fbec86ed

                                                      SHA512

                                                      8814f6d1b4d864e9124e57a7f5aebb20861e48f420ad17b0f36090ab0a5ffaa71d9b24d140e9bdef10cc3b068a3894d54a48ef2c9f2d30100358920b00a131b1

                                                    • memory/584-132-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-83-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-77-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-71-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-0-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-4-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                      Filesize

                                                      972KB

                                                    • memory/584-3-0x00000000001D0000-0x0000000000870000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/584-2-0x00000000001D1000-0x00000000001E8000-memory.dmp

                                                      Filesize

                                                      92KB

                                                    • memory/584-1-0x0000000077060000-0x0000000077062000-memory.dmp

                                                      Filesize

                                                      8KB

                                                    • memory/1568-190-0x0000000006CF0000-0x0000000007937000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1568-205-0x0000000006CF0000-0x00000000071A0000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-147-0x0000000001060000-0x000000000150C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-172-0x0000000001060000-0x000000000150C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-189-0x0000000006CF0000-0x0000000007937000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1568-208-0x0000000006CF0000-0x0000000007937000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1568-244-0x0000000001060000-0x000000000150C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-259-0x0000000006CF0000-0x0000000007387000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/1568-264-0x0000000006CF0000-0x00000000071A0000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-391-0x0000000006CF0000-0x0000000007387000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/1568-446-0x00000000065D0000-0x0000000006894000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/1568-443-0x0000000001060000-0x000000000150C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1568-463-0x00000000065D0000-0x0000000006894000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/1568-464-0x0000000001060000-0x000000000150C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/1980-481-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1980-705-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1980-472-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                      Filesize

                                                      10.4MB

                                                    • memory/1980-451-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1980-261-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1980-254-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/1980-191-0x0000000000D80000-0x00000000019C7000-memory.dmp

                                                      Filesize

                                                      12.3MB

                                                    • memory/2280-128-0x00000000020E0000-0x000000000258C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2364-145-0x00000000011E0000-0x000000000168C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2364-130-0x00000000011E0000-0x000000000168C000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2432-263-0x0000000000340000-0x00000000009D7000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/2432-260-0x0000000000340000-0x00000000009D7000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/2600-206-0x0000000000D90000-0x0000000001240000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2600-243-0x0000000000D90000-0x0000000001240000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2608-170-0x0000000000380000-0x00000000003A6000-memory.dmp

                                                      Filesize

                                                      152KB

                                                    • memory/2608-482-0x0000000000580000-0x000000000059A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/2608-483-0x00000000005A0000-0x00000000005A6000-memory.dmp

                                                      Filesize

                                                      24KB

                                                    • memory/2608-169-0x0000000000AC0000-0x0000000000BE6000-memory.dmp

                                                      Filesize

                                                      1.1MB

                                                    • memory/3116-697-0x0000000000B10000-0x0000000000B1C000-memory.dmp

                                                      Filesize

                                                      48KB

                                                    • memory/3204-471-0x0000000000A60000-0x0000000000D24000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/3204-466-0x0000000000A60000-0x0000000000D24000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/3204-449-0x0000000000A60000-0x0000000000D24000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/3204-450-0x0000000000A60000-0x0000000000D24000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/3204-448-0x0000000000A60000-0x0000000000D24000-memory.dmp

                                                      Filesize

                                                      2.8MB

                                                    • memory/3588-488-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-485-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-486-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-493-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-494-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-490-0x0000000000080000-0x0000000000101000-memory.dmp

                                                      Filesize

                                                      516KB

                                                    • memory/3588-496-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB

                                                    • memory/3676-514-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                      Filesize

                                                      4KB