Analysis

  • max time kernel
    112s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2024 00:19

General

  • Target

    95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe

  • Size

    3.7MB

  • MD5

    47d78937897b4346b6ad5e5501d8b864

  • SHA1

    687a26e05cf5151da22f4ab9713ecad7e447c795

  • SHA256

    95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd

  • SHA512

    17bc5ac8b9a2b723706f7c29b48ebbfab28e57b432298fc1ae08dcf9219f6d3d8ced70a5b310dedfadbeba408fba7e0a4629491a0b5649d4f9ae2406070ab0b0

  • SSDEEP

    98304:0fEs/7VYZPG7/wGd8BIxAhStyekHscn8BdXj9tv+pT:095GGdshStyekH5nUdXjPmp

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

xworm

C2

185.196.8.239:7000

Attributes
  • Install_directory

    %Userprofile%

  • install_file

    WindowsUpdaterConf.exe

  • telegram

    https://api.telegram.org/bot8070077125:AAEdRIyp1anHye9Y0jcV8uNF6U4mmijN8Pk/sendMessage?chat_id=1818813749

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

https://dwell-exclaim.biz/api

https://formy-spill.biz/api

https://covery-mover.biz/api

https://dare-curbys.biz/api

https://print-vexer.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Xworm Payload 1 IoCs
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 11 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 18 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 10 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe
    "C:\Users\Admin\AppData\Local\Temp\95eb3c7a36ea30b9a86fc19e958a49b472d3b6224ee3c5581bfd9a6669b02bfd.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3804
      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
        "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Adds Run key to start application
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4032
        • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
          "C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1528
          • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe
            "C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe"
            5⤵
              PID:7068
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:3500
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'wL3EGdM.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:7024
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\WindowsUpdaterConf.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:5252
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WindowsUpdaterConf.exe'
                6⤵
                • Command and Scripting Interpreter: PowerShell
                PID:5852
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WindowsUpdaterConf" /tr "C:\Users\Admin\WindowsUpdaterConf.exe"
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:5552
            • C:\Windows\SysWOW64\cmd.exe
              "cmd" /c timeout /t 1 && DEL /f wL3EGdM.exe
              5⤵
                PID:3512
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 1
                  6⤵
                  • Delays execution with timeout.exe
                  PID:2100
            • C:\Users\Admin\AppData\Local\Temp\1012553001\ffa12d1060.exe
              "C:\Users\Admin\AppData\Local\Temp\1012553001\ffa12d1060.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:348
            • C:\Users\Admin\AppData\Local\Temp\1012554001\9b21e87caa.exe
              "C:\Users\Admin\AppData\Local\Temp\1012554001\9b21e87caa.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:5568
            • C:\Users\Admin\AppData\Local\Temp\1012555001\06926d39fc.exe
              "C:\Users\Admin\AppData\Local\Temp\1012555001\06926d39fc.exe"
              4⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:924
            • C:\Users\Admin\AppData\Local\Temp\1012556001\694cc73203.exe
              "C:\Users\Admin\AppData\Local\Temp\1012556001\694cc73203.exe"
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:1360
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM firefox.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5184
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM chrome.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4828
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM msedge.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:6636
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM opera.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3372
              • C:\Windows\SysWOW64\taskkill.exe
                taskkill /F /IM brave.exe /T
                5⤵
                • System Location Discovery: System Language Discovery
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:7076
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:5784
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                  6⤵
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:6788
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {882cc319-419a-4e74-a954-c2dbdb40b645} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" gpu
                    7⤵
                      PID:6396
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2476 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82cb9ab3-eb7c-4702-a386-b77eb7ffb910} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" socket
                      7⤵
                        PID:6628
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 1 -isForBrowser -prefsHandle 3116 -prefMapHandle 3112 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a9fcfda-c752-4890-bace-59b27e93cad2} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab
                        7⤵
                          PID:6812
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 3104 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d61fca49-09e4-43d7-b1d1-06864ae3d692} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab
                          7⤵
                            PID:4028
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4652 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {31f8baf3-aac4-42e2-8683-a13cca7704fc} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" utility
                            7⤵
                            • Checks processor information in registry
                            PID:1100
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 2108 -prefMapHandle 3376 -prefsLen 29090 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {01de2449-fa27-4acf-be5e-c069e8ca450f} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" gpu
                            7⤵
                              PID:6944
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2124 -childID 3 -isForBrowser -prefsHandle 2312 -prefMapHandle 2488 -prefsLen 26998 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11c42a98-ee55-489c-8f80-85972c35ca81} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab
                              7⤵
                                PID:4368
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 4 -isForBrowser -prefsHandle 5264 -prefMapHandle 5272 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0af3bb10-0cb3-48ed-90dc-8475997cac84} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab
                                7⤵
                                  PID:5828
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5380 -childID 5 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 932 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {13745daf-f281-4d71-bed7-a7bfda8988e5} 6788 "\\.\pipe\gecko-crash-server-pipe.6788" tab
                                  7⤵
                                    PID:7012
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM firefox.exe /T
                                5⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:7108
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM chrome.exe /T
                                5⤵
                                • Kills process with taskkill
                                PID:6368
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM msedge.exe /T
                                5⤵
                                • Kills process with taskkill
                                PID:5764
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM opera.exe /T
                                5⤵
                                • Kills process with taskkill
                                PID:5588
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /F /IM brave.exe /T
                                5⤵
                                • Kills process with taskkill
                                PID:1704
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                5⤵
                                  PID:5244
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                    6⤵
                                      PID:6640
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244710 -appDir "C:\Program Files\Mozilla Firefox\browser" - {91cd80ad-9f71-480f-b206-b4f0aabd4522} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" gpu
                                        7⤵
                                          PID:5020
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94e2a2ef-f7c3-4cef-924c-1f0680036f7c} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" socket
                                          7⤵
                                            PID:6184
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1608 -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 2896 -prefsLen 22652 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d13d73e3-f78c-470e-818b-d77d0b05e5ab} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab
                                            7⤵
                                              PID:6688
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4112 -childID 2 -isForBrowser -prefsHandle 4104 -prefMapHandle 4100 -prefsLen 29144 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5fb129a-9741-49b2-ba04-75ae4a396acf} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab
                                              7⤵
                                                PID:1004
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4728 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4784 -prefMapHandle 4768 -prefsLen 29197 -prefMapSize 244710 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32576220-9b77-4c40-8f07-31da077455ed} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" utility
                                                7⤵
                                                  PID:5316
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4064 -childID 3 -isForBrowser -prefsHandle 5216 -prefMapHandle 5204 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4b1fb343-d7d1-4c0c-bced-2eab3b02a4d9} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab
                                                  7⤵
                                                    PID:940
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5364 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5436 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {423e5a1f-6c4d-4b77-8655-cda00c0d34d4} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab
                                                    7⤵
                                                      PID:3440
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5584 -childID 5 -isForBrowser -prefsHandle 5348 -prefMapHandle 5352 -prefsLen 27051 -prefMapSize 244710 -jsInitHandle 1292 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b7c86b1-e9ce-40aa-ade8-d02e6023a70c} 6640 "\\.\pipe\gecko-crash-server-pipe.6640" tab
                                                      7⤵
                                                        PID:6612
                                                • C:\Users\Admin\AppData\Local\Temp\1012557001\0693ad23dc.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1012557001\0693ad23dc.exe"
                                                  4⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1096
                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe
                                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe
                                              2⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1444
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 1644
                                                3⤵
                                                • Program crash
                                                PID:1756
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5536
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1444 -ip 1444
                                            1⤵
                                              PID:4420
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              1⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5596

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                              Filesize

                                              2KB

                                              MD5

                                              968cb9309758126772781b83adb8a28f

                                              SHA1

                                              8da30e71accf186b2ba11da1797cf67f8f78b47c

                                              SHA256

                                              92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

                                              SHA512

                                              4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              4da0717493a858392dace74ff54a02c8

                                              SHA1

                                              53aeeb7cd7d348c1d0a353dc8653b6cc1852fb00

                                              SHA256

                                              49ad18601980ec19faddc0b22de35bfec9e85c0e90072ee0c0e26a8b6e377867

                                              SHA512

                                              69c067150c2f61b08f583d918103deee3bb31f34cbab0a6bbb6af30e4aebce8936241cea2e142b1cb6423518219e4acf8c90b8ba4560d304b595f8004264abfe

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              cc691740a18ef935a1c6e9bbb52884a9

                                              SHA1

                                              22a4692d41d0a9755b9f28929536c3e7bf657d87

                                              SHA256

                                              75837fced03c31309026e0df7f3c788c1830acdef0a3ed2522569675b703ddec

                                              SHA512

                                              c3a6f3b306ef792955e0c58cecc492a5b473e551e2a7697ee15fc7d532ae9952487635e7b4557d0992fc112d0be0c9a23a39a59be1a5cacc9eca01f3250a4cae

                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                              Filesize

                                              18KB

                                              MD5

                                              2849603e2b5d4885cf0de6f078d490f8

                                              SHA1

                                              41a8f623bff2af3d619574b27f290c6a167a9114

                                              SHA256

                                              d9fce677e367135e9729a62efcce7a2125023539c91a16182a77e958a8aba98a

                                              SHA512

                                              33efb5e624524426aab4224d4e8623ae8cef99548654428aa4da2a510e67af0f21ff9f5f796ca971376edc0867f3b989a5149f8e4df0bf92a562958a06d4de8a

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json.tmp

                                              Filesize

                                              25KB

                                              MD5

                                              04899944ff37205c1703122942ba0c01

                                              SHA1

                                              f9471d71fcf7c2cd9f837192091c7e9426ce7b30

                                              SHA256

                                              a747427d187e44e632d39916fef601faf123e35fe0d99505d424f45f33bc7200

                                              SHA512

                                              5a54f22b745487e9fdd7159b9f881fa58d8519a2127bdef65b482082c3904a874a903fbe3a9827de917ee2d4c9603df00e9ef90b8b7248485728451f692ad778

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json.tmp

                                              Filesize

                                              20KB

                                              MD5

                                              d54ed23a79a315ff241863aa6f0d7533

                                              SHA1

                                              ee5b5b908e4dec2912e7e653885e6ba0e0a89790

                                              SHA256

                                              64484b90efc25eb9367a20ad9f972b65aefea04101b95185753ed0229d07cb41

                                              SHA512

                                              9886bc9a345e4447422c58433c8a1e8db58ecfa9e0f2a5e26bb06044d3353ce40979935edd3109f2302d41fada0c655c627c36139ccb5c7c356dec4507e0912d

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\254256B27E0C48CF9B80B695F0B3B8CA84610495

                                              Filesize

                                              9KB

                                              MD5

                                              d084158a9e0aebdfc542bae44f92ed64

                                              SHA1

                                              9918cddc880db1dce96b9120c168e45c5a7c15e1

                                              SHA256

                                              321c5466f588060ae45fe2cf7711751fd6fd66e784898a6934f87a8567b64919

                                              SHA512

                                              522852a1ec90e8631465eb942c158a82846eca016cbda36dad384258497ebe2252b8347b765270bc5299138b289c1639bd6ca4a12b7e74843f33bc3ac7b267a8

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F

                                              Filesize

                                              14KB

                                              MD5

                                              070bf76d37c6a098af19270750597f3e

                                              SHA1

                                              0aa4803ee8c3d84e6ac7727ef5e42addbde2afd3

                                              SHA256

                                              a7186a3d63fba9d11a0354140bcc40c93797368552877e5f3c38891056901823

                                              SHA512

                                              128ddcdda7aa08a5c8a30c35b7c9d64dfa562b63f1fd287fdda8e02017ef3832bf65d0659a39ac230a67533b2f8560b6de92c36c7f248d04349b2e36f254b238

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                              Filesize

                                              15KB

                                              MD5

                                              96c542dec016d9ec1ecc4dddfcbaac66

                                              SHA1

                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                              SHA256

                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                              SHA512

                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                            • C:\Users\Admin\AppData\Local\Temp\1012475001\wL3EGdM.exe

                                              Filesize

                                              3.3MB

                                              MD5

                                              7823e902900881094372948957825fe1

                                              SHA1

                                              297a663f3b64fb9863164d10ac698bef03dd3a0f

                                              SHA256

                                              92d36e5fb3fdbf10ad10c7880c40013c2e21b8a49e20720137d2b4851681233f

                                              SHA512

                                              60d4ea35cfec5154cfa3cb767de7c839ca8b3987b27599ea218ec1c47f1d111a59f193cd3cfd1266ae384434ae653f1e0a297f7222a2592e529b2b4404dd6238

                                            • C:\Users\Admin\AppData\Local\Temp\1012548001\rhnew.exe

                                              Filesize

                                              612B

                                              MD5

                                              e3eb0a1df437f3f97a64aca5952c8ea0

                                              SHA1

                                              7dd71afcfb14e105e80b0c0d7fce370a28a41f0a

                                              SHA256

                                              38ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521

                                              SHA512

                                              43573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf

                                            • C:\Users\Admin\AppData\Local\Temp\1012553001\ffa12d1060.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              89109257f23f068de9f04a3c59df2b15

                                              SHA1

                                              03ea7063a9d7b54bcdea8f11a990e668d9346121

                                              SHA256

                                              74567ee5c75fd4a34c44dc8c75e9f4ea1dcf3c60d6d3fff4e8d8526460e49b10

                                              SHA512

                                              b3203b1dbbb28a8f0e69e067c9b48e6a930e05046674f3b7f82a76b4b2ff0f8535150ed46dddbe8421fe4ced283f9edf76e2d15f54c454d43771f4e350655f48

                                            • C:\Users\Admin\AppData\Local\Temp\1012554001\9b21e87caa.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              14553b3e4f83021e14520e0f62f95a24

                                              SHA1

                                              35f37fc3ed8d53920b96b8485e741097cfcd05ba

                                              SHA256

                                              d31671f91056db4b63277269b84841872b047643116fce88f5952393daa22691

                                              SHA512

                                              9f1a23fa7632155407bdbe9eb2a21708b241906d817c9eaa8cfef2ca65acf67135d8b8e7249b580f67685ccec9b487b65ff1c48378af6418bc7976393dbfdc90

                                            • C:\Users\Admin\AppData\Local\Temp\1012555001\06926d39fc.exe

                                              Filesize

                                              4.9MB

                                              MD5

                                              ebe3d112a464bca87d0600558998c287

                                              SHA1

                                              e24f303f33d3d4bd2afc5bc0392de5f14e4bd72a

                                              SHA256

                                              08c78546997ccfbffb833a115f8888ad128e5c4d43bddd9e01e2105132ef0824

                                              SHA512

                                              fcfd10bd5c930ec50bfa011752db8a28526994712ecb3b905d2d892099df69dcc90ff881669f5b323b99ae9a19061cb5c8abb86b18fc31012d9b91b653c24bed

                                            • C:\Users\Admin\AppData\Local\Temp\1012556001\694cc73203.exe

                                              Filesize

                                              948KB

                                              MD5

                                              9e7ce696dfdb127b028a0610a441047d

                                              SHA1

                                              79a7805f957617896fd16ec5d1db102d9809f667

                                              SHA256

                                              bcb1df1e3ce692f4e284bf91f1873696933a5f2ffd87ac966b719e492b43d1eb

                                              SHA512

                                              b226a736eee638e1ef2dc4dfdb6193b23756b525d665209efc6094ba119ddff3004844b8439034e67d79ded9ddff82369edf6d735f72a0e916763dedfa6d1c0a

                                            • C:\Users\Admin\AppData\Local\Temp\1012557001\0693ad23dc.exe

                                              Filesize

                                              2.6MB

                                              MD5

                                              10f89bc59dd3ebb89c8437a590abbb97

                                              SHA1

                                              cb65670a5597fe2bca2423648b7e8325eedbe112

                                              SHA256

                                              252af078fcf7992ce1afa0449ffa8591725bf9c46219b19d85369fdc657c8b00

                                              SHA512

                                              60d3cedf0b29d9dfdf0eb030ffa817fb102f72bbe6cc5e105d17cd9ddd355c3e9e4374f10bef70919d033f83b3eb1f311bf868bc922633ba8482a9776c84db5d

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1C03U2.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              6d17158239deaa10445332a320d93bb4

                                              SHA1

                                              d7928e790267e50aa28a8f734329ea302f8176bb

                                              SHA256

                                              547aec0f988c87b03e73231738462dd61c430708e6f9120eddfa1310b34524cf

                                              SHA512

                                              c002e6913b1a5674d00e9077af4fada039b06f290114c47d3cd58b5ababc713bf9ba84defcf791e1dd51f93662e940baee376214b24c01fcdca0fd867bde55ff

                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2O9294.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              70f314a25f00b355a279523a9697b6d0

                                              SHA1

                                              c178ca3e12e65ddf72b5da4e824ca266420b94b7

                                              SHA256

                                              0ac722bdbc25fb4932ec228a7285f44210149c8880707e55f79f67a1a60090cb

                                              SHA512

                                              40229050e3a9a30fbceacf7f089ac1fff24d428e59a2cc8bd5bd2b3efc443d63e69eb660d12de07a946bf846192a5f04f1ecf931c0608e306a7703937dd928b5

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ltgy50rj.i2j.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              479KB

                                              MD5

                                              09372174e83dbbf696ee732fd2e875bb

                                              SHA1

                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                              SHA256

                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                              SHA512

                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              13.8MB

                                              MD5

                                              0a8747a2ac9ac08ae9508f36c6d75692

                                              SHA1

                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                              SHA256

                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                              SHA512

                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                              Filesize

                                              6KB

                                              MD5

                                              9ec05f2d786678e9df978b1ff11047cd

                                              SHA1

                                              49780bc1d71ec8380f86a600a1b443c8bf02916b

                                              SHA256

                                              7a5eb57680ade70e6b8c5378ca9e31f9decb88e00d324168c931a40c5eafbd61

                                              SHA512

                                              a3fd2080ca1af12773d9fd0ab9bb1bd69f1a3623c70abbfc7d1dd623952b5f30cdeb83e17614d8177cab7e4d29ea0d73a684c5393cc06c61d980f2171f4058ca

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                              Filesize

                                              10KB

                                              MD5

                                              efb2c7b3f7863dfe438d3d954fb7c958

                                              SHA1

                                              68ab0929f75a9a75aa372dab61d2418d3d290497

                                              SHA256

                                              dc2847165081fcbac530cd9231a932de3d6132fe3e2c3bcfe5d98e650346b5b9

                                              SHA512

                                              ed69cbad175be324a19792af621e79156b43444decaedd9cdc279c59b8ce13babac008abe0e7be4d878ab25ef8e6f27bedbe349717d7b4af45925b01235137dc

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin

                                              Filesize

                                              11KB

                                              MD5

                                              ba71a3bc27291b614e63c5b22d62593d

                                              SHA1

                                              0db2a2cc5f19002219a4417737e8a0a5c8154e51

                                              SHA256

                                              a84a12e5bfb675c3f08e68581187357f410caeb626a91b42a831b87eb2f931f5

                                              SHA512

                                              be57febf28f6b4ec9c97f2c7e182b5ac34ff7b03e510c08766d762add30b4f0c9c5f346dbb851f175b09b03000cda328478224e55a89dbd068fb8e7894e612a3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\SiteSecurityServiceState.bin

                                              Filesize

                                              1KB

                                              MD5

                                              489587bbd1326a3e256775c07204cdc7

                                              SHA1

                                              466b212a7aea946a92f0f224413109fd91989a42

                                              SHA256

                                              542ff72a1d30614efec1f78aa117d7ead893a1d08d13cc57487ebc4dd46e24c7

                                              SHA512

                                              544b7f058a2711b633277603d26bb6ba70a660069d234b25f7e713969ec1cda6b7d1b9d235154df8b751a158dd499d1c22bd107a1f25fdaebc1c1fc8007765bf

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cert9.db

                                              Filesize

                                              224KB

                                              MD5

                                              0f27096a0cad14767cbf065dc8ecf25b

                                              SHA1

                                              14bb39529db5119977f129185cb2edff77cda9cf

                                              SHA256

                                              cf863f85c55c02abd5bb3c7b27fdf74e694b51bb9b618bd66fdd1470f7643c7f

                                              SHA512

                                              bc2bb41e3ac3fbcbd14c0a906178fd7f4ac5ff9e601107a02a2d610e39c8241b98783d5f8eb32363a2534584df12db14791dbe754a5a7182c7edc5cb292e500e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cookies.sqlite-wal

                                              Filesize

                                              64KB

                                              MD5

                                              fb8edefe8474eb62c9a21167d0cc5a2d

                                              SHA1

                                              7b7fccfd967b64c45e78e699f38e6584da43fd8b

                                              SHA256

                                              9c2551115db4db1681fc48caa7c0ef3d85ec9b08fc2be1dc94a6976dc2aaf516

                                              SHA512

                                              f792f8859b14a176d88ef1ec470896a6411f676f8bf3eb26fe60fa3588904161d4b17f3f437e00dc8e7b89fcac514f221d3bfef0cbe9a012baef389254ba3790

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                              Filesize

                                              23KB

                                              MD5

                                              79e37dd386efeccbbe5022ad3b8ebaec

                                              SHA1

                                              acdebe3c3b166c2a38e16e114e2b86fba134720c

                                              SHA256

                                              9e48307770f445976ffb2b5cd12ec7df95c15b7195d9cd729f8d502cfcc54f0a

                                              SHA512

                                              252ed0e5d36ccb69d86dbd760bc0b3f91c14d39a2d03444eec0b55ff5c7af6b9e39896b2f50c2d8a534bb21c2c1fda5736bd52b5fd456f34c835ae0027fc5ec6

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.bin

                                              Filesize

                                              21KB

                                              MD5

                                              a2eac039d031b257f6766dcb89aa6262

                                              SHA1

                                              776844ed4b66d3121c8a96784b27d89648f452c6

                                              SHA256

                                              600727cc16257ce3ab33e6c7dd67e6a3f53523930e66d3b833c229276c369225

                                              SHA512

                                              32687a1566e450b7a5fac2d24ee4b0323e23e9d72bb77be394efd30b3d462a12b63e6a74149b785d8d8048b4792de2c28c5371ab2d7e35cbdfb70094756576cc

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              21KB

                                              MD5

                                              1edd8d1bf8fddb18a0136c7a53551c23

                                              SHA1

                                              353b3aac0fbe5438e34558af1b170f27d76d7165

                                              SHA256

                                              7d193c8d46cf1d8cae0b7d81e80320dfc9e20108196575e766cb26ba1ec51ae6

                                              SHA512

                                              5356f0d2d0a011afc103e17c39a617a0254ef1578518e2982f8944037adeaec5e20b520fff0eb3e81bee00ea08c3d3bf3fa5df1922529fad16c27e0f34cb3fc5

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              23KB

                                              MD5

                                              37557b5c324432de5f4a607b2e80953a

                                              SHA1

                                              fc7c0190aa47496bb5b8ceb5b2c810ac5cdd3e34

                                              SHA256

                                              9e7ce05e90ee30ab91eb6305ea3431a41034b353503b51a1e2cf984dc4a50b32

                                              SHA512

                                              c378290e685708cc67e54d24e5cd4f470db7dee83820b40163a690b0920164958317f2b241d8430d831783f8e5a8fe2b6eba1e1a41e2105ad110dc44101ce2bb

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              22KB

                                              MD5

                                              7be28f66ab8e6403c3d66f2b61c951bf

                                              SHA1

                                              8ff91fe65e564ee029576cd1dfe9aae586ddbb0d

                                              SHA256

                                              fd7e1c6bc85da8d432027536bb2247ea0897bfca3bb90f39cccb42bdad9039b7

                                              SHA512

                                              3f267a9203b48b33e06de46be290d039b50c40c908b27672f67cbc5d7c462e60d675b5582b57ce0c5ee60c4bfd803a6f4571294a9611f96e530ac7ce4c1d7169

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp

                                              Filesize

                                              22KB

                                              MD5

                                              f99f6215c5032a5e915c2756ec902600

                                              SHA1

                                              b6b4e1655c7af19c92d3e16e5d96dbf9fbab3f45

                                              SHA256

                                              ab31ad558f01a23c00c00e8821558b8a98e9805928d2a31035c08c190b0cc536

                                              SHA512

                                              49757537e6b25d02764f9ffcdd677717581102f9abe89ebfc10fd48098569f8f1f42deedf42f46aeb1c75cfb03b7d0363e643a140c6167d58280ecf33b94b39f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\events\events

                                              Filesize

                                              104B

                                              MD5

                                              defbf00981795a992d85fe5a8925f8af

                                              SHA1

                                              796910412264ffafc35a3402f2fc1d24236a7752

                                              SHA256

                                              db353ec3ecd2bb41dfbe5ed16f68c12da844ff82762b386c8899601d1f61031d

                                              SHA512

                                              d01df9cab58abf22ff765736053f79f42e35153e6984c62a375eb4d184c52f233423bb759a52c8eed249a6625d5b984a575ca4d7bf3a0ed72fc447b547e4f20a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\70114f75-92fa-43b0-b8f2-f2e7d379aed6

                                              Filesize

                                              982B

                                              MD5

                                              0bbe960616e9e8287ba859f46749ee40

                                              SHA1

                                              4c3dd1ef552f0c69fa146cdb0cac4bbe6478daf5

                                              SHA256

                                              1102b10a933640fce1f5549c31352c2e8323c98e6c93337e79e3dc0b7de0cf2c

                                              SHA512

                                              8bc273736f735fff7f963a04adc5ec192f649af2172b44dbe6c00edcf425a87b4933d097a53501db5e520da75f429e546c9debf0f5bec24c0a5923ebf5f062a1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\8179c0d4-b67c-4ebf-8aba-2c01650b50ac

                                              Filesize

                                              905B

                                              MD5

                                              47c468a99e5350ca5e97543b5348acea

                                              SHA1

                                              2fd8aeae55f5a4ffb438a2cc8e14a1d92c034a3b

                                              SHA256

                                              b1b0b3ce673eafd4e34ac94834ddbb9e2a6de94b07c052895db22b615e4a3849

                                              SHA512

                                              ba761142b891ebab21700c8d445633251af37cb7f2afc834a5dbabbfb23b1ab1c8e5aa5682228ac710f11665401862de3ecde8e291162d3b8f9dd6d5a05dfc03

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a1570113-ea9d-4eaa-9b4c-1c780516ec1d

                                              Filesize

                                              659B

                                              MD5

                                              156e0d8f713ab387cc81d5cb316d90b6

                                              SHA1

                                              2fff7b44c3c06b3d8493c7d10dc98ee5867da194

                                              SHA256

                                              8577421819e570caf8288b3936bb27ad45094cb3b547efd7894f723e747d7a64

                                              SHA512

                                              07cda745ae18364ca7751e1915b8ba0ef73b735d4a6500aacaea406e167b61ebd35fdb67834ca410395a76e737de4074f181f517579db8b5f3f7926f91464c51

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\e8750165-f95f-4648-9a0f-68d1fcad1708

                                              Filesize

                                              653B

                                              MD5

                                              05ce42af44f62de618c36d2898f2ac76

                                              SHA1

                                              13a7b2ad95440a5840745b469fc4d8f4439b9873

                                              SHA256

                                              6b81522566672af1aef3eb05a9a4dd9b97d903e35f44726d62d57d7a6473fdce

                                              SHA512

                                              5d7400ee6a583651e4d4742ed72acca34211223ed7f131d0b07a6553db01cf4bc0046a6a708738a356087944f0c2c007a7d61e2b84b01b578fc7ea754c613ebb

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\fd941b67-16dc-401b-aa86-a8cf7fbe2362

                                              Filesize

                                              648B

                                              MD5

                                              dc29386c2827cc25d62f97cc48fe333a

                                              SHA1

                                              ce46f405dcbd017b571c39a548f4dcd03c85b351

                                              SHA256

                                              2b66b5e08499a80de78db510242ea67742ef175613368079df6f23749db92f42

                                              SHA512

                                              37d2f7bc22c706400189efbe854b3abcb2ed0f374c50fa4ccbb2cbdb3ae7b6739986175434b07346682f4b85d001c29ea1f1641e6fff15eac75bad4f562fc40a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                              Filesize

                                              1.1MB

                                              MD5

                                              842039753bf41fa5e11b3a1383061a87

                                              SHA1

                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                              SHA256

                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                              SHA512

                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              2a461e9eb87fd1955cea740a3444ee7a

                                              SHA1

                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                              SHA256

                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                              SHA512

                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              bf957ad58b55f64219ab3f793e374316

                                              SHA1

                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                              SHA256

                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                              SHA512

                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                              Filesize

                                              17.8MB

                                              MD5

                                              daf7ef3acccab478aaa7d6dc1c60f865

                                              SHA1

                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                              SHA256

                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                              SHA512

                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\permissions.sqlite

                                              Filesize

                                              96KB

                                              MD5

                                              a671a61d74f5a4a91938a959be35acba

                                              SHA1

                                              23fcfd3b0adde0f470bbd51278a22a35d5ed1d09

                                              SHA256

                                              727eecd957e92cccfaba03ddc05d63cba12adf48bb49c717bc2d09b30e51d716

                                              SHA512

                                              5c7963b1cbd06d4b29a26252ddd2d96e99f897449019ba3de3f2884f0faaee46922d6b50554cc0983ea569fb871c20e0904ad3a2be0e99275b4f3251590e0772

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\places.sqlite-wal

                                              Filesize

                                              2.0MB

                                              MD5

                                              2d1926e4b832e49a3f3d4d6b8587419a

                                              SHA1

                                              e55143bafb99a3667c6cbdda66cdc08552da8ffd

                                              SHA256

                                              54579986f197dc7c42d33bebf56e8adfe88a56d86cf899f28ba09d14426ff92b

                                              SHA512

                                              9ff162731dea95e9b1cf57d9b1ff8b0fb3b9d09bd67ba966c0f9653c50c7935a59435267553f2744f24ccc63b71594ff152ccc0a877de68457240d7cf4fa07c5

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                              Filesize

                                              11KB

                                              MD5

                                              6244082aab33aec6b5a31060c5e1b95e

                                              SHA1

                                              f654fed085bdae6550be1b4eb2a16da355bdc187

                                              SHA256

                                              5752e8f8806a0eb5e97b50193ff10b8a2139b8bb9e05ef7177032ca6fd29ce5c

                                              SHA512

                                              b58509d9956e62277f724943f22f322f5040778819edaac79c26ff1e8590656f002d7243fae81ab971cfc6760f8707f6a23cfb54ed17bef3c7645a7bcc00a78e

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs-1.js

                                              Filesize

                                              11KB

                                              MD5

                                              c5b89ba89372cf08aea16dae8acdaeb1

                                              SHA1

                                              15785be99f6d0ba44076efd9ad50619f19cf127c

                                              SHA256

                                              ca5ed421d9d77b4012dc2d4bdb6d6e7442f095c4c65da62fd0176b17913a8bed

                                              SHA512

                                              3c2d35bb2de9f180d5495b5d944ea464cf4d8fb0f963bf9608a75662c0cd97ce3d81ff7f242636cd9dea6deb65ba5e5b80c092e74a4d43d44b48328e77c4bc81

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                              Filesize

                                              10KB

                                              MD5

                                              2169982d6e193e372084e99e18e7564c

                                              SHA1

                                              a6592ff75056a674d4bf68ba76d754d6ef2504cf

                                              SHA256

                                              1976f348b134749ee7cd6a44e9fb2ff374e353363f13ba6c19d5a9a267cec595

                                              SHA512

                                              cca2ae0135b475315a2d4a3c8af10c9c216ac1c9d18e75306d721751c74162fea8375e428ed6404d26b17e23773258c6295b0bc090ed13d503304a966292325a

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\prefs.js

                                              Filesize

                                              10KB

                                              MD5

                                              2e00c4c63aaeedbca09e5e84f0b06bab

                                              SHA1

                                              4b624fd49d1b755da75fcd87c52b4fcb59b5e80d

                                              SHA256

                                              4662405c126e441f913a1c9369262487d4bc5f8d721fb88e087c6599c74eeeca

                                              SHA512

                                              283bf2c11d278742037a23a863e8a2059b3a410352ab1ce48bdbfa1fc3fa05eedf0a2519a5063f37a9b40968e33b0d819a66d45bb354019ca01e2a18af1b0e12

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\protections.sqlite

                                              Filesize

                                              64KB

                                              MD5

                                              76786a4c0dd19d88d6d3ed95a293bf2f

                                              SHA1

                                              b0d6d676127a7694fc6e71ee57fcc2ffaa621ff7

                                              SHA256

                                              1a2564c1ba20b8038d35c2319258d94dc15d97914dcf753b31c48b79940dfd31

                                              SHA512

                                              8cd3298e2ebba763d3c80ac4b17e44af7eb63b46304967d0c6316d314baf8611c05f7b9979c2c5c329ac167aea0246e8c9f057ffbb272481c13fd5e4b4bcb2d0

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\sessionCheckpoints.json

                                              Filesize

                                              53B

                                              MD5

                                              ea8b62857dfdbd3d0be7d7e4a954ec9a

                                              SHA1

                                              b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a

                                              SHA256

                                              792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da

                                              SHA512

                                              076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\sessionCheckpoints.json

                                              Filesize

                                              90B

                                              MD5

                                              c4ab2ee59ca41b6d6a6ea911f35bdc00

                                              SHA1

                                              5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                              SHA256

                                              00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                              SHA512

                                              71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                              Filesize

                                              376KB

                                              MD5

                                              77f6ba5d2552e702bfc3c8e33c338da9

                                              SHA1

                                              c99df3ac7a9c294865a2f962c38ce20bf4b3d32f

                                              SHA256

                                              6ecd7832eee26920c61db90fa8beeb4a9565e78a69c521ff279bcf1f4623a30f

                                              SHA512

                                              e27c9bf7c6a99985d6ce6e8dd08f202ce4c48fa84876757f0e5c57670804572fca03af11419a2ed27c1c30cab17ae41e7d9bbfbec990b72aeddbd7b682769732

                                            • memory/348-2738-0x0000000000400000-0x0000000000C84000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/348-7013-0x0000000000400000-0x0000000000C84000-memory.dmp

                                              Filesize

                                              8.5MB

                                            • memory/924-7819-0x00000000009F0000-0x0000000000EE4000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/924-11691-0x00000000009F0000-0x0000000000EE4000-memory.dmp

                                              Filesize

                                              5.0MB

                                            • memory/1096-13998-0x0000000000F70000-0x0000000001220000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/1096-18491-0x0000000000F70000-0x0000000001220000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/1096-16391-0x0000000000F70000-0x0000000001220000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/1096-12363-0x0000000000F70000-0x0000000001220000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/1096-13999-0x0000000000F70000-0x0000000001220000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/1444-975-0x00000000005E0000-0x0000000000A75000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1444-28-0x00000000005E0000-0x0000000000A75000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1444-20348-0x00000000005E0000-0x0000000000A75000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1528-69-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-107-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-48-0x0000000000010000-0x000000000036E000-memory.dmp

                                              Filesize

                                              3.4MB

                                            • memory/1528-49-0x0000000004D40000-0x0000000004EF8000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-50-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-57-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-55-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-87-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-38497-0x00000000050B0000-0x0000000005116000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/1528-51-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-53-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-59-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-61-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-63-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-65-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-67-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-71-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-73-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-75-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-77-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-85-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-79-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-81-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-83-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-89-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-91-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-93-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-95-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-97-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-99-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-101-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-103-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-105-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-109-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/1528-111-0x0000000004D40000-0x0000000004EF2000-memory.dmp

                                              Filesize

                                              1.7MB

                                            • memory/3500-38521-0x0000000005630000-0x0000000005652000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/3500-38584-0x0000000007820000-0x0000000007E9A000-memory.dmp

                                              Filesize

                                              6.5MB

                                            • memory/3500-38599-0x0000000007500000-0x0000000007508000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/3500-38598-0x0000000007520000-0x000000000753A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3500-38519-0x00000000025C0000-0x00000000025F6000-memory.dmp

                                              Filesize

                                              216KB

                                            • memory/3500-38520-0x0000000004FA0000-0x00000000055C8000-memory.dmp

                                              Filesize

                                              6.2MB

                                            • memory/3500-38597-0x0000000007420000-0x0000000007434000-memory.dmp

                                              Filesize

                                              80KB

                                            • memory/3500-38522-0x00000000057A0000-0x0000000005806000-memory.dmp

                                              Filesize

                                              408KB

                                            • memory/3500-38596-0x0000000007410000-0x000000000741E000-memory.dmp

                                              Filesize

                                              56KB

                                            • memory/3500-38533-0x00000000059B0000-0x0000000005D04000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/3500-38537-0x0000000005EB0000-0x0000000005ECE000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3500-38538-0x0000000005EE0000-0x0000000005F2C000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3500-38590-0x00000000073E0000-0x00000000073F1000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/3500-38554-0x0000000007040000-0x0000000007072000-memory.dmp

                                              Filesize

                                              200KB

                                            • memory/3500-38588-0x0000000007460000-0x00000000074F6000-memory.dmp

                                              Filesize

                                              600KB

                                            • memory/3500-38556-0x0000000070290000-0x00000000702DC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/3500-38586-0x0000000007250000-0x000000000725A000-memory.dmp

                                              Filesize

                                              40KB

                                            • memory/3500-38585-0x00000000071E0000-0x00000000071FA000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/3500-38579-0x00000000070B0000-0x0000000007153000-memory.dmp

                                              Filesize

                                              652KB

                                            • memory/3500-38567-0x0000000007080000-0x000000000709E000-memory.dmp

                                              Filesize

                                              120KB

                                            • memory/3804-11-0x0000000000530000-0x0000000000A0C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/3804-7-0x0000000000530000-0x0000000000A0C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/3804-8-0x0000000077184000-0x0000000077186000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/3804-9-0x0000000000531000-0x000000000055F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/3804-10-0x0000000000530000-0x0000000000A0C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/3804-25-0x0000000000530000-0x0000000000A0C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/4032-23-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/4032-544-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/5252-38668-0x0000000070290000-0x00000000702DC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5536-10118-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/5536-8852-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/5568-23358-0x0000000000FA0000-0x0000000001466000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5568-9775-0x0000000000FA0000-0x0000000001466000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5568-5541-0x0000000000FA0000-0x0000000001466000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/5596-29780-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/5596-30958-0x0000000000690000-0x0000000000B6C000-memory.dmp

                                              Filesize

                                              4.9MB

                                            • memory/5852-38692-0x00000000702A0000-0x00000000702EC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5852-38689-0x0000000005E90000-0x0000000005EDC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/5852-38702-0x0000000007360000-0x0000000007371000-memory.dmp

                                              Filesize

                                              68KB

                                            • memory/5852-38703-0x0000000007390000-0x00000000073A4000-memory.dmp

                                              Filesize

                                              80KB

                                            • memory/7024-38615-0x0000000070290000-0x00000000702DC000-memory.dmp

                                              Filesize

                                              304KB

                                            • memory/7024-38604-0x00000000057B0000-0x0000000005B04000-memory.dmp

                                              Filesize

                                              3.3MB

                                            • memory/7068-38505-0x0000000000400000-0x000000000041A000-memory.dmp

                                              Filesize

                                              104KB

                                            • memory/7068-38506-0x0000000005A50000-0x0000000005AEC000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/7068-38710-0x0000000007340000-0x00000000078E4000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/7068-38711-0x0000000006F20000-0x0000000006FB2000-memory.dmp

                                              Filesize

                                              584KB

                                            • memory/7068-38712-0x0000000007000000-0x000000000700A000-memory.dmp

                                              Filesize

                                              40KB