Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 16:08

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    9ee9fc91594ff0d745d83ae3ede6c725

  • SHA1

    27ca7f96db3ed74658fc89ca6d33db35c59d8a77

  • SHA256

    5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

  • SHA512

    bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

  • SSDEEP

    49152:lkk2FX4poT387IR/vpA82dUSZ3nVZdUuHKSMuj:qk7ow7IRpd2djlV8Amu

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 14 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 7 IoCs
  • Identifies Wine through registry keys 2 TTPs 7 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 13 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\1010998001\39e90d519b.exe
        "C:\Users\Admin\AppData\Local\Temp\1010998001\39e90d519b.exe"
        3⤵
        • Enumerates VirtualBox registry keys
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:488
      • C:\Users\Admin\AppData\Local\Temp\1010999001\8034b8e4bb.exe
        "C:\Users\Admin\AppData\Local\Temp\1010999001\8034b8e4bb.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:1760
      • C:\Users\Admin\AppData\Local\Temp\1011000001\f09cdd03dd.exe
        "C:\Users\Admin\AppData\Local\Temp\1011000001\f09cdd03dd.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2416
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:872
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6f59758,0x7fef6f59768,0x7fef6f59778
            5⤵
              PID:2440
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:2712
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1144 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:2
                5⤵
                  PID:2640
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:8
                  5⤵
                    PID:2736
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:8
                    5⤵
                      PID:2788
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2152 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2244
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2360 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:320
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2368 --field-trial-handle=1212,i,3609438443395300899,15084308344450754070,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:1604
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IECFIEGDBK.exe"
                    4⤵
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    PID:3796
                    • C:\Users\Admin\Documents\IECFIEGDBK.exe
                      "C:\Users\Admin\Documents\IECFIEGDBK.exe"
                      5⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3832
                • C:\Users\Admin\AppData\Local\Temp\1011001001\58ff8b6101.exe
                  "C:\Users\Admin\AppData\Local\Temp\1011001001\58ff8b6101.exe"
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:692
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM firefox.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2276
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM chrome.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2624
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM msedge.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:664
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM opera.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1572
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /F /IM brave.exe /T
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:876
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                    4⤵
                      PID:1712
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                        5⤵
                        • Checks processor information in registry
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:608
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.0.1200874021\1907746587" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1140 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffde8471-8f4c-4f87-a1cf-b544bc72fcc9} 608 "\\.\pipe\gecko-crash-server-pipe.608" 1292 fcdb358 gpu
                          6⤵
                            PID:2708
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.1.2022801469\1841249423" -parentBuildID 20221007134813 -prefsHandle 1528 -prefMapHandle 1524 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b4e63df-6d82-4430-b749-2d96a5ae6c7a} 608 "\\.\pipe\gecko-crash-server-pipe.608" 1540 ebed358 socket
                            6⤵
                              PID:1284
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.2.1444115001\33608752" -childID 1 -isForBrowser -prefsHandle 1972 -prefMapHandle 1968 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4dd4ca65-3b5d-408f-b9d5-152db82a0f92} 608 "\\.\pipe\gecko-crash-server-pipe.608" 1984 fc6e158 tab
                              6⤵
                                PID:712
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.3.1085161062\177755314" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2616 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cd18d4a-c378-4223-8b0f-d76123525a1a} 608 "\\.\pipe\gecko-crash-server-pipe.608" 2640 1bf86658 tab
                                6⤵
                                  PID:1148
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.4.1793347335\210491709" -childID 3 -isForBrowser -prefsHandle 3584 -prefMapHandle 3660 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5865f718-293f-4a61-80bc-3ce767dc9550} 608 "\\.\pipe\gecko-crash-server-pipe.608" 3436 1fb75858 tab
                                  6⤵
                                    PID:2852
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.5.1812225147\1152625749" -childID 4 -isForBrowser -prefsHandle 4044 -prefMapHandle 4048 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ee176ff6-adc7-4357-8740-d0b2cd828b63} 608 "\\.\pipe\gecko-crash-server-pipe.608" 4036 1fb77058 tab
                                    6⤵
                                      PID:2236
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="608.6.569839364\151963251" -childID 5 -isForBrowser -prefsHandle 4128 -prefMapHandle 4124 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 608 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b0b122aa-cc34-4d07-bf81-bb3c59fdf529} 608 "\\.\pipe\gecko-crash-server-pipe.608" 4144 1fb77958 tab
                                      6⤵
                                        PID:2556
                                • C:\Users\Admin\AppData\Local\Temp\1011002001\c98ac18276.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1011002001\c98ac18276.exe"
                                  3⤵
                                  • Modifies Windows Defender Real-time Protection settings
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Windows security modification
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3352
                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                              1⤵
                                PID:924

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                Filesize

                                148KB

                                MD5

                                90a1d4b55edf36fa8b4cc6974ed7d4c4

                                SHA1

                                aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                SHA256

                                7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                SHA512

                                ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf775b88.TMP

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\activity-stream.discovery_stream.json.tmp

                                Filesize

                                24KB

                                MD5

                                904b8d8472802d6697610d1e373f4cb0

                                SHA1

                                18797b54900a9c9c8efd35fcc51fab7c3e62bf6c

                                SHA256

                                8d2a0c49ae7dbbf736136265895d160ef1600a02a8a3512661a903ab79294617

                                SHA512

                                b12e26a190b71e0e9343fa91c41416207f540940499347f65c75ca8ab40210476dda6a10ec2d191a93bd6c4f39dcb13a6331cb0d9b37aed09c0ed6b1585dcb65

                              • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1009pdhg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                Filesize

                                13KB

                                MD5

                                f99b4984bd93547ff4ab09d35b9ed6d5

                                SHA1

                                73bf4d313cb094bb6ead04460da9547106794007

                                SHA256

                                402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069

                                SHA512

                                cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759

                              • C:\Users\Admin\AppData\Local\Temp\1010998001\39e90d519b.exe

                                Filesize

                                4.3MB

                                MD5

                                b4be5ad70bafb7fd8096c70ccc223689

                                SHA1

                                9a41ba755db441b9d762eac47268e29b087723c8

                                SHA256

                                2d71fd241e16c6cd912681e48288466fb61004cac77d6c3a86d8338034a69dd0

                                SHA512

                                f7666764eae7de42a3b929159fb96dbc9465ed9777c288e5b5c6b4b68ecf41b2da0806d295a7732e93baf37aa24e4a609a46cd52407af238e9cc83524c12b4e3

                              • C:\Users\Admin\AppData\Local\Temp\1010999001\8034b8e4bb.exe

                                Filesize

                                1.8MB

                                MD5

                                fa502b1d8b3fd6084a8ac5607ae1a701

                                SHA1

                                da41f5746a8df16395ba38fa1ca010b3a58b7cb1

                                SHA256

                                dab3f816539604580361e0f1de4f391c6a643d472220c3c3565033a80afb9c20

                                SHA512

                                a9c721f4b966d1935fa54c2248fede74d665dbae873da50c87c64fa5ad19f598c623029e56764cfd6c45a331e907be87cd2a1ef47bfe78e2ae22465fea9c5502

                              • C:\Users\Admin\AppData\Local\Temp\1011000001\f09cdd03dd.exe

                                Filesize

                                1.7MB

                                MD5

                                f06a9313a2586312b79a17d7426b348d

                                SHA1

                                810536724fce4c6f706f7ef1d113de7a4f97e2c4

                                SHA256

                                4219b97fe661f55a1dbd0f3c71187a6809ec655bb042e0d0c10371dfdba8d8a6

                                SHA512

                                515f162e7856ae909fbbca4c622b914d7904bb11658097a2fae5500d80fb864eaa64298459d473816afea2291b9e57096891f6174254c174fc10fe279f247b1e

                              • C:\Users\Admin\AppData\Local\Temp\1011001001\58ff8b6101.exe

                                Filesize

                                900KB

                                MD5

                                52e7b98611794a903f22fb5e6d8b7082

                                SHA1

                                8c686ba7c52015f6fdd9c0af115a345fe4b754bd

                                SHA256

                                b1660980c049d293a668e1186f6f8d7a9d4436b9d3e9d10e084943c49269b024

                                SHA512

                                2dfcf2d2c74c669592e5ac993a4ffef54befd9e5039bcdddc3bf3b8ee056e861f84dfc38125bd4d4f7f7d7faf5ab0e2cefdc76d5ec13a607ed074b65f4d7e0bd

                              • C:\Users\Admin\AppData\Local\Temp\1011002001\c98ac18276.exe

                                Filesize

                                2.6MB

                                MD5

                                742a2e1aa103d7931fb9222139bac2d5

                                SHA1

                                9fd653f171990ac664860de6779ea89dc375c840

                                SHA256

                                4bbf30f5144a256a7e80022d0fba5bbb5b73ea5fac2d135b22a3b72d403b24bf

                                SHA512

                                9ac8d6e36cbdb464d96c9773ec977114d09fec8ca06ad5bd4d636966ca060c3e61bd22324c6707e2b552fb0404af7d2238b8b4613cece0e2dc5cc30a88580bb9

                              • C:\Users\Admin\AppData\Local\Temp\Cab99C2.tmp

                                Filesize

                                70KB

                                MD5

                                49aebf8cbd62d92ac215b2923fb1b9f5

                                SHA1

                                1723be06719828dda65ad804298d0431f6aff976

                                SHA256

                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                SHA512

                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                              • C:\Users\Admin\AppData\Local\Temp\Tar9A13.tmp

                                Filesize

                                181KB

                                MD5

                                4ea6026cf93ec6338144661bf1202cd1

                                SHA1

                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                SHA256

                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                SHA512

                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                Filesize

                                442KB

                                MD5

                                85430baed3398695717b0263807cf97c

                                SHA1

                                fffbee923cea216f50fce5d54219a188a5100f41

                                SHA256

                                a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                SHA512

                                06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                              • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                Filesize

                                8.0MB

                                MD5

                                a01c5ecd6108350ae23d2cddf0e77c17

                                SHA1

                                c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                SHA256

                                345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                SHA512

                                b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\cookies.sqlite-wal

                                Filesize

                                256KB

                                MD5

                                0009b58bd6011f5d6d9766d75b15e847

                                SHA1

                                36a72b3035dbf8abb4ae5b4e75fa62fa7d6ce101

                                SHA256

                                594db53ab2861795b5930919eb2f390ad2c3fbe5d333affba2f12364e4fcf8c5

                                SHA512

                                343152a6027607ac6d3806c6e798824a2cbd0e6fb20a2c2476cfefa69e6cd388777b59cfb17805afeff09a8def9a755bba756538828d274e88cb148861b12855

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\db\data.safe.bin

                                Filesize

                                2KB

                                MD5

                                1fe93a629ad8e919285069416bff83a5

                                SHA1

                                dc8b8bae0e1ef82f5b6ec1a5dd8c1d5906a29f8b

                                SHA256

                                f800d213b63ef27f41f45c0d6e8b9b88ee8e21377f2a946f3c4315ec7b3fffb1

                                SHA512

                                d3f250529d31947f352a8bb5cae1431199900a6b5acfc7b2d3950fd7486d5ae8c0fba967cdf5ae7ef0739f629c9d99873602b0e0b62b70e45a0c41bcbafbee87

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\3d7ce57f-390b-4931-8a05-3414723c892e

                                Filesize

                                745B

                                MD5

                                c65eb03db2883b1a92988f6611bc6988

                                SHA1

                                037f414beefadde98a534db2f78ab37d6ad514b0

                                SHA256

                                cd01a53a10f9bc353c66dbf725a7bd18aa29c63abde9d3142120b6d389892d02

                                SHA512

                                c44b51aaea2ffa3f3c5b0b34ed152ffc1e8a573b8476621df558ecda941e20f958ef097e280da2feacc669519bb0d123bb36a9f318aeaa380896fc9a8d055dd8

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\datareporting\glean\pending_pings\71b3cd48-ddba-4973-8e63-718e88148a0e

                                Filesize

                                12KB

                                MD5

                                813039bd27dbab0f4cb9ca155a97a027

                                SHA1

                                c390dee192676b1b06ab47b9f6b80118f2099a2e

                                SHA256

                                1b5633d43ce327055355229995ed3770ceec394d82d92cd382a7318c6cd24a12

                                SHA512

                                67352b862a9e4f8b5549642b5bf8288b9085e3d449b6bf6eed73dee0ea0326fddceb38197f7fd85d2a1436945afa5cc966e35ff4cfe5f191a55d111e737abeea

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                Filesize

                                997KB

                                MD5

                                fe3355639648c417e8307c6d051e3e37

                                SHA1

                                f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                SHA256

                                1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                SHA512

                                8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                Filesize

                                116B

                                MD5

                                3d33cdc0b3d281e67dd52e14435dd04f

                                SHA1

                                4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                SHA256

                                f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                SHA512

                                a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                Filesize

                                479B

                                MD5

                                49ddb419d96dceb9069018535fb2e2fc

                                SHA1

                                62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                SHA256

                                2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                SHA512

                                48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                Filesize

                                372B

                                MD5

                                8be33af717bb1b67fbd61c3f4b807e9e

                                SHA1

                                7cf17656d174d951957ff36810e874a134dd49e0

                                SHA256

                                e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                SHA512

                                6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                Filesize

                                11.8MB

                                MD5

                                33bf7b0439480effb9fb212efce87b13

                                SHA1

                                cee50f2745edc6dc291887b6075ca64d716f495a

                                SHA256

                                8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                SHA512

                                d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                Filesize

                                1KB

                                MD5

                                688bed3676d2104e7f17ae1cd2c59404

                                SHA1

                                952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                SHA256

                                33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                SHA512

                                7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                Filesize

                                1KB

                                MD5

                                937326fead5fd401f6cca9118bd9ade9

                                SHA1

                                4526a57d4ae14ed29b37632c72aef3c408189d91

                                SHA256

                                68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                SHA512

                                b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\places.sqlite-wal

                                Filesize

                                1.4MB

                                MD5

                                202bda56d3f44513a34a7f0300291bec

                                SHA1

                                3444fa408e7b1526955bc1118071b6a58f59ea0a

                                SHA256

                                bb650a0a4e8fe5720420bd556a20309648c2615cf15047a108bc95107d197697

                                SHA512

                                97ab088c90b0a3a237d1ed800efc2d8a275de0640350fd4aea9dc2ce8375913ada8c0f4050ca3add8d5501bb14fb8ae2de395bdd67989976bc7bd461dab94065

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                Filesize

                                6KB

                                MD5

                                a977df510b6f3b8d72a19eb2fcafdcd2

                                SHA1

                                18229ac6cda8bd78d379a0ed6c58ef592992dfcf

                                SHA256

                                d18299f744d55f10a8e5792c9372fda4941ad45d55d5ee3660db185b2b73db90

                                SHA512

                                1bddd75da842d509f17771c7babc7afa9ea094874fe5d7ad9acc2ec7c0de48376fffcfb37bbcde6cbe47e809380f74d26003a5dc9d3501beb0219bae0d7a7cc3

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                Filesize

                                6KB

                                MD5

                                305141017e02247c931b90f01b387823

                                SHA1

                                30040cf0778d4edd746237482c87c4eeac9087f4

                                SHA256

                                70314f3c0886974fcc9e75779e41a5f926e041bd0476f5d2edf1439108a67102

                                SHA512

                                8568420c29110e5e9a3e1b963e11f932dc0eda87e5ca03a72f7b536bdae86d38e00445c1dbb0be383ff28c35bdfff70cb1c0e1c982494c39f2047e871ebed04f

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                Filesize

                                7KB

                                MD5

                                d15272fa6bcf5f619022cb0cdd0defe3

                                SHA1

                                4416c9bef4c6645f6f022e3b882fced68f73368e

                                SHA256

                                4064ea91bba336a31ccb1462b293ce909461c6b32507bf897759d2816fc7c1a0

                                SHA512

                                a6f6e7523f1119c6161a6c1bd73a522304d241cd2146b96876a30ff832ad193b0e280c83466dc7ab2ebec7f308ff23b4e30777e8aa723e7ed94b3101e242183f

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\prefs-1.js

                                Filesize

                                6KB

                                MD5

                                826d2d9f14a2bd92772366c8b0826c32

                                SHA1

                                dea352cae3b19c4484343108f126b1d9c7c7c55e

                                SHA256

                                dd1b062086e236bd0a4f91df83fb939c7525875f72bc436300d35b246bcdd41e

                                SHA512

                                c2ead41836ca3afcfd5857fb9d0c54a450c5a7bef7c644b373ac6944d20ac3ef05a23fdd59f783858b71068e2ec4b450be325ff855ec18afec8b2b1932419b08

                              • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1009pdhg.default-release\sessionstore-backups\recovery.jsonlz4

                                Filesize

                                4KB

                                MD5

                                b47d041b1fdca51f05aaa11b7665c0dc

                                SHA1

                                2af4cd09b4cc4fb0a19d96567521b0c0f00f3123

                                SHA256

                                311cea3908ab129b79a6f21738817dd1c62f8220d40d6cf0d80e883a20f0639e

                                SHA512

                                7e41478e8852d4a547c348e3964d54bd818bf2c45c85ae94c5e5cc9b0dad1135031d780208648bab5294a8b75113608ad1f3e06270f3b534a65dc6f3903a8851

                              • \ProgramData\mozglue.dll

                                Filesize

                                593KB

                                MD5

                                c8fd9be83bc728cc04beffafc2907fe9

                                SHA1

                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                SHA256

                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                SHA512

                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                              • \ProgramData\nss3.dll

                                Filesize

                                2.0MB

                                MD5

                                1cc453cdf74f31e4d913ff9c10acdde2

                                SHA1

                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                SHA256

                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                SHA512

                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                              • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                Filesize

                                1.8MB

                                MD5

                                9ee9fc91594ff0d745d83ae3ede6c725

                                SHA1

                                27ca7f96db3ed74658fc89ca6d33db35c59d8a77

                                SHA256

                                5aad15bf881eac2533ceb43ab4a3e65c90ab5cb42412677ad1f0f393a4d2efa7

                                SHA512

                                bf7d5e625fbe7adb3d1bbdc60d9263a8bb3cc000f6053033ae1ea786f7a657e5012f0f0946835b18622313e6b0f298b0e1e7aa29329f89a9f45ad440220fccef

                              • memory/488-89-0x00000000003E0000-0x000000000106D000-memory.dmp

                                Filesize

                                12.6MB

                              • memory/488-45-0x00000000003E0000-0x000000000106D000-memory.dmp

                                Filesize

                                12.6MB

                              • memory/488-67-0x00000000003E0000-0x000000000106D000-memory.dmp

                                Filesize

                                12.6MB

                              • memory/1760-91-0x0000000000FE0000-0x0000000001478000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1760-65-0x0000000000FE0000-0x0000000001478000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1760-120-0x0000000000FE0000-0x0000000001478000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1760-427-0x0000000000FE0000-0x0000000001478000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/1760-339-0x0000000000FE0000-0x0000000001478000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2192-25-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-84-0x0000000007070000-0x0000000007701000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2192-44-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-30-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-29-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-260-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-534-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-28-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-312-0x0000000006A50000-0x0000000006CF0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2192-533-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-532-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-531-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-530-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-529-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-27-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-161-0x0000000007070000-0x0000000007701000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2192-63-0x0000000007070000-0x0000000007508000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2192-64-0x0000000007070000-0x0000000007508000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2192-26-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-68-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-372-0x0000000006A50000-0x0000000006CF0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/2192-371-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-518-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-517-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-46-0x0000000007070000-0x0000000007CFD000-memory.dmp

                                Filesize

                                12.6MB

                              • memory/2192-85-0x0000000007070000-0x0000000007701000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2192-20-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-442-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-434-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-23-0x0000000000230000-0x00000000006EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/2192-22-0x0000000000231000-0x000000000025F000-memory.dmp

                                Filesize

                                184KB

                              • memory/2192-90-0x0000000007070000-0x0000000007508000-memory.dmp

                                Filesize

                                4.6MB

                              • memory/2416-106-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                Filesize

                                972KB

                              • memory/2416-311-0x0000000000890000-0x0000000000F21000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2416-87-0x0000000000890000-0x0000000000F21000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2416-390-0x0000000000890000-0x0000000000F21000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2416-307-0x0000000000890000-0x0000000000F21000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/2416-378-0x0000000000890000-0x0000000000F21000-memory.dmp

                                Filesize

                                6.6MB

                              • memory/3004-5-0x00000000011B0000-0x000000000166F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-18-0x00000000011B0000-0x000000000166F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-0-0x00000000011B0000-0x000000000166F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-10-0x00000000011B0000-0x000000000166F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-21-0x0000000006C30000-0x00000000070EF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-3-0x00000000011B0000-0x000000000166F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3004-2-0x00000000011B1000-0x00000000011DF000-memory.dmp

                                Filesize

                                184KB

                              • memory/3004-1-0x00000000778B0000-0x00000000778B2000-memory.dmp

                                Filesize

                                8KB

                              • memory/3352-314-0x0000000000040000-0x00000000002E0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/3352-380-0x0000000000040000-0x00000000002E0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/3352-315-0x0000000000040000-0x00000000002E0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/3352-392-0x0000000000040000-0x00000000002E0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/3352-313-0x0000000000040000-0x00000000002E0000-memory.dmp

                                Filesize

                                2.6MB

                              • memory/3796-385-0x00000000022F0000-0x00000000027AF000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3832-386-0x0000000000C80000-0x000000000113F000-memory.dmp

                                Filesize

                                4.7MB

                              • memory/3832-388-0x0000000000C80000-0x000000000113F000-memory.dmp

                                Filesize

                                4.7MB