Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 19:16

General

  • Target

    951cf3533607dc4c7a2bca6569388c644fa4e2f74692b7912cd3577243651667.exe

  • Size

    1.8MB

  • MD5

    fe9009bad1b9e0a07a73cb1cff390875

  • SHA1

    7a78a0f90a24d149abd549d73d99c8c2c399a591

  • SHA256

    951cf3533607dc4c7a2bca6569388c644fa4e2f74692b7912cd3577243651667

  • SHA512

    1456b95073a088e2a0e53584e4bbf23fa3318f9d70858027b5657a8f0ca7cd4a2ea578dd0e6a940be527d1f8a280423d39ccc6f24fc1eaa6e5614b372ef1570e

  • SSDEEP

    49152:2aunHrprxN+GAYlAg/IdmhG0s+jRZneSjEHX2:2/H+alOQ7jRZneSjCG

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\951cf3533607dc4c7a2bca6569388c644fa4e2f74692b7912cd3577243651667.exe
        "C:\Users\Admin\AppData\Local\Temp\951cf3533607dc4c7a2bca6569388c644fa4e2f74692b7912cd3577243651667.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
          "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4388
          • C:\Users\Admin\AppData\Local\Temp\1010747001\01d38b7a3f.exe
            "C:\Users\Admin\AppData\Local\Temp\1010747001\01d38b7a3f.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1156
          • C:\Users\Admin\AppData\Local\Temp\1010748001\36977b68dd.exe
            "C:\Users\Admin\AppData\Local\Temp\1010748001\36977b68dd.exe"
            4⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            PID:1128
          • C:\Users\Admin\AppData\Local\Temp\1010749001\1ceb7ccb85.exe
            "C:\Users\Admin\AppData\Local\Temp\1010749001\1ceb7ccb85.exe"
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4020
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM firefox.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5048
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM chrome.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:4312
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM msedge.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:208
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM opera.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1356
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /F /IM brave.exe /T
              5⤵
              • System Location Discovery: System Language Discovery
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:5044
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1828
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                6⤵
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2604
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd7db3fb-7d2f-44f8-9d97-dccab4284e45} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" gpu
                  7⤵
                    PID:3440
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2368 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {21ffab19-f605-4cbb-8f99-ea6fcd5f07bf} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" socket
                    7⤵
                      PID:3080
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2868 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 1584 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04a9cbb6-983a-45c7-8ed9-9e09c6aa3690} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                      7⤵
                        PID:3268
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4020 -childID 2 -isForBrowser -prefsHandle 4012 -prefMapHandle 3996 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7f81a9c0-8020-4276-82a0-f32e4683795f} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                        7⤵
                          PID:3472
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4804 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4768 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59c7dad8-cde3-4204-aef7-504537796fa8} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" utility
                          7⤵
                          • Checks processor information in registry
                          PID:5488
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5288 -childID 3 -isForBrowser -prefsHandle 5340 -prefMapHandle 5336 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a3904af-3e7f-4225-9a38-8299f3cf81b0} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                          7⤵
                            PID:6000
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5468 -childID 4 -isForBrowser -prefsHandle 5548 -prefMapHandle 5544 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d571b0ca-c799-4c6f-9ac5-ac64ca6e49ad} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                            7⤵
                              PID:6012
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5740 -prefMapHandle 5736 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ed51595-bd8e-4df6-bc2b-82414515a4ab} 2604 "\\.\pipe\gecko-crash-server-pipe.2604" tab
                              7⤵
                                PID:6024
                        • C:\Users\Admin\AppData\Local\Temp\1010750001\738398e826.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010750001\738398e826.exe"
                          4⤵
                          • Modifies Windows Defender Real-time Protection settings
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Windows security modification
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4996
                        • C:\Users\Admin\AppData\Local\Temp\1010751001\83109b5f48.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010751001\83109b5f48.exe"
                          4⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5476
                        • C:\Users\Admin\AppData\Local\Temp\1010752001\d16780ea3e.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010752001\d16780ea3e.exe"
                          4⤵
                          • Enumerates VirtualBox registry keys
                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                          • Checks BIOS information in registry
                          • Executes dropped EXE
                          • Identifies Wine through registry keys
                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4496
                        • C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe
                          "C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe"
                          4⤵
                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:5716
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                      2⤵
                      • System Location Discovery: System Language Discovery
                      PID:424
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 1336
                        3⤵
                        • Program crash
                        PID:5792
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 424 -s 1348
                        3⤵
                        • Program crash
                        PID:5956
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5776
                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                    1⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:6148
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 424 -ip 424
                    1⤵
                      PID:224
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 424 -ip 424
                      1⤵
                        PID:2880

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json

                        Filesize

                        19KB

                        MD5

                        fe3cf8e7a8fce62ac02c437ceb7c09cd

                        SHA1

                        9c47db4ff7e5d02765a6450fd1e1cb776ab421b5

                        SHA256

                        aae44fd277c2a9b9e1fb690d0bbe6866e8ae38fc9ba9d815a7be10e81ef7684c

                        SHA512

                        41e3b3419100b84749123e41e2b4a65d57dac068ad0cfbafc68b97a46c0cd4cc69375513c2c8c5e6e47b4503dfbad32fa78e57210aa0ae4825f3cba93f5b2513

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                        Filesize

                        13KB

                        MD5

                        77b4d8dfaeb8956062acab12343429be

                        SHA1

                        561aa3f1a9709108af9bf82ba2f066ad631eaa94

                        SHA256

                        b198ac4c6b076f9fe3d613c6bc8e90b6e408ae51f736692fedc1ac29ddcc2dd4

                        SHA512

                        eba5074a5395effafec7c9029c07fafbb67286e0deba5fb7cac6d2b71eb6b0434c8ec1549b15fe8e84f0f97b4ac46a4d70141f6f81b5821fe5169a7505a45127

                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984

                        Filesize

                        13KB

                        MD5

                        dacf0f3fc38cab5a98ce79fb301a0bf2

                        SHA1

                        27315bd89f59a29f5d403cf1ad7c60d6ec44cc45

                        SHA256

                        e5c31f21a61677f27a042f3da1e15f97cd6696fbeaa8c145d81908275939b6e1

                        SHA512

                        fc4751f89bc53aa0447064e7b4c6b6cc1cc5b5426c0b41ceaed3a6c1a332271892e013ce95c682178e41e99065ff392a58ffeb19c6cfd29fa7d38bd3a35563fe

                      • C:\Users\Admin\AppData\Local\Temp\1010747001\01d38b7a3f.exe

                        Filesize

                        1.8MB

                        MD5

                        c5103207a3b98da28114905e88ffd683

                        SHA1

                        0ab1cff327da40e05a12e5ec04e7753927232763

                        SHA256

                        f3b283a7eb6bb28fbea20f57a74b15f0733aec403eef7e534678e8bc5d103416

                        SHA512

                        8d8e5d314277f532f29e07407bc3cc9da53462ecdf0b2a2d10b0b60b14508d5a3d817fee0f89ebcbde3ee112adc5668deca7c606c449f923c70e0b1472f19a3f

                      • C:\Users\Admin\AppData\Local\Temp\1010748001\36977b68dd.exe

                        Filesize

                        1.8MB

                        MD5

                        f0438630b15ee4910a4dfdf34b7f5554

                        SHA1

                        d6a86098c6c2f30eadd79f6815b60d7dc941c3b0

                        SHA256

                        0fdbe3eceee6813e6df6271fd8ea3fbde8e488ce2d85cfcdfa8412b81a72e145

                        SHA512

                        2ef8a59d9ba95bc6a184b7adf05eacdd7d99a09adc5945ae87759d5c64aabe2cfd1e04ce28ca4245d1bfa3c80d0a0e549494f7d921f6892cb3006b1e2191e238

                      • C:\Users\Admin\AppData\Local\Temp\1010749001\1ceb7ccb85.exe

                        Filesize

                        900KB

                        MD5

                        e62f5c8a8c8582b8dad99cb1049472cf

                        SHA1

                        2ddf5e7a8a725526b84abfb70f29b7c1978e739d

                        SHA256

                        69b03b523d280b1a575ef883cc8f07d158a5ec9f742679bdb46f64b8ae49caae

                        SHA512

                        e5e3b8b1f28f0693bedefac6b9f0122f1318ef1480154f38b455011abe14efbfac1a28b55c078530fcca71ca434357db281ae9f2f6c2bddffc4eed079f149bd3

                      • C:\Users\Admin\AppData\Local\Temp\1010750001\738398e826.exe

                        Filesize

                        2.6MB

                        MD5

                        cd7522561b1bed5f69785893189745a0

                        SHA1

                        ef5aeb76d274d7b81cd7fb0bb21e1493225c163c

                        SHA256

                        2f55ef3c2a65cf13f4a55884e32db48c2b88466c500d6bfdcc4c4c968d7a9106

                        SHA512

                        384b55537b59cde36c77d8d0fb76a6b31871e427a9d50ff053f4b1a6997bc9008522eab984ff95c596e2b024e0ed2233a581ded9ebb009ba507c994729e5d49c

                      • C:\Users\Admin\AppData\Local\Temp\1010751001\83109b5f48.exe

                        Filesize

                        4.2MB

                        MD5

                        6610b85f35e0e905ae4aa5796bdd74d3

                        SHA1

                        c6ec77fd3cc44a63cf15004226f9727531aac130

                        SHA256

                        f79d418541986b8ede0f71551d75782cb1f02ebf06c3508d35649ecd569f88e1

                        SHA512

                        12788928ab6c02de567cfa2d86e120cae45ed16694f640327df21c6acd4c500a7b14875d6fdd001c0c12cd8de89af335d4224e936bb2b229117afc3c5709f199

                      • C:\Users\Admin\AppData\Local\Temp\1010752001\d16780ea3e.exe

                        Filesize

                        4.2MB

                        MD5

                        0b71a02caf459de57403643dd8ce0f4c

                        SHA1

                        1e14dbdc9c6b5127344726b1e187e519153d93e8

                        SHA256

                        58230b6c55117274a65a5c494d72306be6ad9c1e16053628f976a88c43925bad

                        SHA512

                        751dbbf975344306244f679107531bd508b2cad5fd3a12930470e74c8387069407a88245b8e011336674a98aebaf762460bf6f5020fcf3e33a1ba6338223e806

                      • C:\Users\Admin\AppData\Local\Temp\1010753001\WqtakkK.exe

                        Filesize

                        5.3MB

                        MD5

                        30a8bfc34575ec41e0c2cd9306d47e2b

                        SHA1

                        53fd06385e7ef53308c8e8a6c127675531e01f7a

                        SHA256

                        01edf2c34309e30754e4731c7d00375c536cee1a51c5666a54085029347b9542

                        SHA512

                        69d9da40744c8bff5bb363467d0c48141624f450df36639ca2c49e3d104041e632a00c01b19769b000d627d37dd521cf87f629d69cee236e11d28e1113ae4fd5

                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                        Filesize

                        1.8MB

                        MD5

                        fe9009bad1b9e0a07a73cb1cff390875

                        SHA1

                        7a78a0f90a24d149abd549d73d99c8c2c399a591

                        SHA256

                        951cf3533607dc4c7a2bca6569388c644fa4e2f74692b7912cd3577243651667

                        SHA512

                        1456b95073a088e2a0e53584e4bbf23fa3318f9d70858027b5657a8f0ca7cd4a2ea578dd0e6a940be527d1f8a280423d39ccc6f24fc1eaa6e5614b372ef1570e

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                        Filesize

                        479KB

                        MD5

                        09372174e83dbbf696ee732fd2e875bb

                        SHA1

                        ba360186ba650a769f9303f48b7200fb5eaccee1

                        SHA256

                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                        SHA512

                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                        Filesize

                        13.8MB

                        MD5

                        0a8747a2ac9ac08ae9508f36c6d75692

                        SHA1

                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                        SHA256

                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                        SHA512

                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                        Filesize

                        11KB

                        MD5

                        636f76ead130bf201bce81cfca382e43

                        SHA1

                        4dee4fc648accc6b51bebd013eefe4f69bb53f3d

                        SHA256

                        3cf05027d92d533b7a00f381f4acf5444598d6c9cb56579d84e4ecf4bc9a5892

                        SHA512

                        90a2a178ad97752284139ae7c21a4f256e566ed26e8f37e9b0cedb7fa7d8a36cb322c5b4d998dd666802e464225b1af0d50a730e493f5e5a126356501968a299

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin

                        Filesize

                        6KB

                        MD5

                        e5a11ce84d8a0712c47dc9fcb8d3e4c8

                        SHA1

                        b727642e5f8577be43777590e58bbe1524713411

                        SHA256

                        9217f33ec9e1c49a1ea6f019cc9782a1990999048a09ddc6163729d5448fc650

                        SHA512

                        4187ddd14b07334e53d877597d95767d2ec061f0b3d24121c68824b34827625f720e987a11d1c4b38923ce1b0b4dc7e6f48459d16fd8b57c1faa39695bdac97c

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        5KB

                        MD5

                        49bae50bffe1bdad5954d4d054c33f63

                        SHA1

                        fa99ff2eaeda77fb0c682a4f744f40ac952cf734

                        SHA256

                        972e1fd9a890f16b30cbd5d131ca99c92f15ffbe45dea9a948832809328fb215

                        SHA512

                        ef1a85aece9d1eb83016b655726070290a3f28b3090ad026c37aef1249f3888b1325357e725a163add7b1c773e4cd097b6bcb669879edf263a2c7ea8e7721b4e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        849043143bf0a853ece183c7de828faf

                        SHA1

                        23f3669260f40833bfa8045c16eb8a7fb85f9f85

                        SHA256

                        9d3deb1dcaf137e3ac4bb3ba2af1dfff793c1525341ee97577a424e33506624e

                        SHA512

                        d8f971d2e55a1f7adfd0f8d5fb625be9ee9d89b4d0444763865746cc2896244a603efa6520bf7f2cc5e1493c5cee4313d1d263082b731c67a37f8623887db18f

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp

                        Filesize

                        15KB

                        MD5

                        afe3975f72bf62903b8e3327713e42b1

                        SHA1

                        3dc86be9d713fcd8f2fabd36f2f45183d705807a

                        SHA256

                        fc448f20bf5b2ae7c15f0d93252e56d59c328e8c720ab01837d237324c21ae89

                        SHA512

                        389c33f6e68f02769a2ec2169c57f51facc08222df083235277225bc797805b69a5a97f16682d83c015acc00c7ce7e15c9a433ea8e6294bcb98ae0fa313a8768

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\2898a7a8-8917-4cea-86d0-720cea506f61

                        Filesize

                        671B

                        MD5

                        a79e4f478716d4d2a0131a757d9e0155

                        SHA1

                        1008503612813b5dde6bb6526c8862a1913502a9

                        SHA256

                        05baa0a46c2de8084bcc430ec2df65721192f45411fe9abe90be7367348cd254

                        SHA512

                        a260c9e8980fe67f9c9685e853d83dd820c60c72c2dd3b7f2aaa30e94906172a34dae5acfd480cca4d4ba191f23c9f683841fc5938fd566b770709b21717e2b2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\602354b1-83d2-487f-84f0-88f92efed235

                        Filesize

                        27KB

                        MD5

                        9aff306fe1f74119535d1dde683c4b93

                        SHA1

                        f3576b2adacd600b6291ba5378861539babf8c59

                        SHA256

                        1f4df6dd368e98f345a27d3dea2b58249c2d97654f85d33440adf63712a27f63

                        SHA512

                        4bc3bfab95abe6c724039501c5568b0d46187021bb0a4257a86a1bb6bdcf9324d8351f6311556e645916473ac3c3aa1af24542580915c7f6865fb5ad9ef20afa

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\605b8fd0-40af-49ac-9bfa-2c0d3e242265

                        Filesize

                        982B

                        MD5

                        9808c84a077b0b6b3827cdeffc51a6dd

                        SHA1

                        85bab1e0fffc1ebdbdb54b211f765cd842b47df9

                        SHA256

                        1e624c5bfc752ce92cc89cd8b8093a365c23bedbc5f7839c8732e274c6bf9b6d

                        SHA512

                        b7ed5d7f2480e80d461b032406329d66a10d96295a3b85a9ae0d7c282f75110266a65879b9c4bfff36c6e2cc3681705dcb78eff2c8649785e28f2d48cc6faae2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                        Filesize

                        1.1MB

                        MD5

                        842039753bf41fa5e11b3a1383061a87

                        SHA1

                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                        SHA256

                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                        SHA512

                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                        Filesize

                        116B

                        MD5

                        2a461e9eb87fd1955cea740a3444ee7a

                        SHA1

                        b10755914c713f5a4677494dbe8a686ed458c3c5

                        SHA256

                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                        SHA512

                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                        Filesize

                        372B

                        MD5

                        bf957ad58b55f64219ab3f793e374316

                        SHA1

                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                        SHA256

                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                        SHA512

                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                        Filesize

                        17.8MB

                        MD5

                        daf7ef3acccab478aaa7d6dc1c60f865

                        SHA1

                        f8246162b97ce4a945feced27b6ea114366ff2ad

                        SHA256

                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                        SHA512

                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        6742b513d3f2ac020656b95a372a2c97

                        SHA1

                        a59d6b33fb7e4d656ebf03887e5113e24c0437fb

                        SHA256

                        71f77859776de6dc6b3983d500646ff664bd8f31be2bad624182846504494971

                        SHA512

                        006c6dc57a53c3c485d85b4cc0330b1e29230035292b39d0a814c417bbb3c9414686a4fac0f15fb2f8cbe563ff9bed749a6779b537a35fd606c685e919c040b2

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        10KB

                        MD5

                        f755401349aac899acafd0aa8ce52fb0

                        SHA1

                        8b21cfc286c35bf260906ace565ea5e475575b9a

                        SHA256

                        c4d166eaee237de699cc4b944d33ad27d7fb8f684e4f48ccdc6bfd0babe99bd7

                        SHA512

                        d938fd5ab640d30cb5da55e8fade3be664a9a5e0a58c0555157b4b86b501263fe44869036ecf282a7b0c0ef6b4e4e99fb4d483aaf74805bae915c5b06636f393

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs-1.js

                        Filesize

                        15KB

                        MD5

                        fe39509a24d47c3a3b7fc3f8ec37a6a3

                        SHA1

                        0639b737eb00ec69f05f11449547690971f9e33f

                        SHA256

                        e690186025fb68b5d3600ee3c04db1ecb4d124b90981fd1af2bec1c8811d9f92

                        SHA512

                        03e230a9c89c6303a299c9ee08cfbcc53c022cf61e2ff5573b07ea07438e011d7db40970bda80cbd9c05de9d4ee69c2eb323f113dcb23f09a444c154ad558eef

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                        Filesize

                        10KB

                        MD5

                        f1494060347df2952c2d2b0acfe40604

                        SHA1

                        b6b8e7bff18577cb16c35b1d70dfcf55ebaf07fc

                        SHA256

                        aa0ba8035c7294eab4b08813ed394b55c33cb89c1cbc68e0287e939df3dc5576

                        SHA512

                        5579ce45d645e0c70a533bdb3047509c058b8e3f383fbb77e30dd606f068de1ea1b7640eb49dd5a476d9a539ff6d144af7157d95ef7e9a6cc4a7b08d50ec2acc

                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\prefs.js

                        Filesize

                        15KB

                        MD5

                        b5fb816ced76da2c1a4695b4205edf4c

                        SHA1

                        6eef030766dc3a469e7e5d1554fee6ac8829531a

                        SHA256

                        3629119c1e7feb3d5794091050f40d8a6b0740117005db643f3c17f6095674a0

                        SHA512

                        17382b05d136d2e1ec533d8d8eca6f5a7a2ce3e91daac7f5d3cb769cdab8aaff7366315f22404f63671741762b4952502bf1d15f560ba7b0366f3b21d0c3f169

                      • memory/1128-59-0x00000000006D0000-0x0000000000D7F000-memory.dmp

                        Filesize

                        6.7MB

                      • memory/1128-60-0x00000000006D0000-0x0000000000D7F000-memory.dmp

                        Filesize

                        6.7MB

                      • memory/1156-80-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-39-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-41-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-38-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-454-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-79-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/1156-462-0x0000000000040000-0x00000000004E6000-memory.dmp

                        Filesize

                        4.6MB

                      • memory/4388-18-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-42-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-461-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-40-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-37-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-21-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-20-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-19-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-314-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-17-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-2440-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-2680-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-1603-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-884-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-43-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4388-483-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4496-2674-0x00000000004E0000-0x0000000001145000-memory.dmp

                        Filesize

                        12.4MB

                      • memory/4496-2431-0x00000000004E0000-0x0000000001145000-memory.dmp

                        Filesize

                        12.4MB

                      • memory/4828-0-0x0000000000630000-0x0000000000AF0000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4828-3-0x0000000000630000-0x0000000000AF0000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4828-15-0x0000000000630000-0x0000000000AF0000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4828-5-0x0000000000630000-0x0000000000AF0000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/4828-2-0x0000000000631000-0x000000000065F000-memory.dmp

                        Filesize

                        184KB

                      • memory/4828-1-0x0000000077434000-0x0000000077436000-memory.dmp

                        Filesize

                        8KB

                      • memory/4996-1639-0x0000000000690000-0x0000000000936000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/4996-826-0x0000000000690000-0x0000000000936000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/4996-1532-0x0000000000690000-0x0000000000936000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/4996-874-0x0000000000690000-0x0000000000936000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/4996-875-0x0000000000690000-0x0000000000936000-memory.dmp

                        Filesize

                        2.6MB

                      • memory/5476-1883-0x0000000000D70000-0x00000000019FC000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/5476-1323-0x0000000000D70000-0x00000000019FC000-memory.dmp

                        Filesize

                        12.5MB

                      • memory/5716-2751-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2733-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2699-0x0000000000610000-0x000000000079A000-memory.dmp

                        Filesize

                        1.5MB

                      • memory/5716-2700-0x0000000005710000-0x0000000005CB4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/5716-2701-0x0000000005070000-0x0000000005102000-memory.dmp

                        Filesize

                        584KB

                      • memory/5716-2702-0x0000000005030000-0x000000000503A000-memory.dmp

                        Filesize

                        40KB

                      • memory/5716-2703-0x00000000051D0000-0x00000000052DE000-memory.dmp

                        Filesize

                        1.1MB

                      • memory/5716-2709-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2704-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2749-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2747-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2745-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2743-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2741-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2739-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2737-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2735-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2705-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2731-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2729-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2728-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2725-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2723-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2721-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-3884-0x00000000054C0000-0x000000000550C000-memory.dmp

                        Filesize

                        304KB

                      • memory/5716-3885-0x00000000055B0000-0x0000000005604000-memory.dmp

                        Filesize

                        336KB

                      • memory/5716-3883-0x0000000005530000-0x00000000055B0000-memory.dmp

                        Filesize

                        512KB

                      • memory/5716-2719-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2717-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2715-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2713-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2711-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5716-2707-0x00000000051D0000-0x00000000052D9000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/5776-792-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/5776-781-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/6148-3900-0x00000000003B0000-0x0000000000870000-memory.dmp

                        Filesize

                        4.8MB