Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2024 06:02

General

  • Target

    file.exe

  • Size

    3.0MB

  • MD5

    b1d16474d1cce3a573026500af7cdd09

  • SHA1

    edbfb0ba0fb68b51ba33d881874efdf780d107d7

  • SHA256

    9f29fb0df6f61aaecd024f58f699e9952d00ffc004af1764740c9eccea66d6a8

  • SHA512

    c779a79fd10acf03519843c79aec40b36a2304a84534288f79f410642c22afa0f6d9bb6b90cd4bfb00e97d97d9da713e1189741f83361bcc0456520982a238f9

  • SSDEEP

    49152:ampatsGzWEgEPCIo7I/XyjcT7k8eg+SDfgvaI7vqVgDzUO8t:WyEgEPCIoOX8cT7k8eqfAmaDzUvt

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://atten-supporse.biz/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://atten-supporse.biz/api

https://se-blurry.biz/api

https://zinc-sneark.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Users\Admin\AppData\Local\Temp\1013116001\a1a021c621.exe
        "C:\Users\Admin\AppData\Local\Temp\1013116001\a1a021c621.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1616
      • C:\Users\Admin\AppData\Local\Temp\1013117001\1fbe0a40b7.exe
        "C:\Users\Admin\AppData\Local\Temp\1013117001\1fbe0a40b7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2500
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef72b9758,0x7fef72b9768,0x7fef72b9778
            5⤵
              PID:2372
            • C:\Windows\system32\ctfmon.exe
              ctfmon.exe
              5⤵
                PID:1480
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1132 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:2
                5⤵
                  PID:2504
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1508 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:8
                  5⤵
                    PID:2312
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:8
                    5⤵
                      PID:2476
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1656 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2240
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2416 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2860
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2520 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:1
                      5⤵
                      • Uses browser remote debugging
                      PID:2576
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1448 --field-trial-handle=1288,i,696544856237858272,9187225990868054260,131072 /prefetch:2
                      5⤵
                        PID:1544
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                      4⤵
                      • Uses browser remote debugging
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      PID:3364
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4e19758,0x7fef4e19768,0x7fef4e19778
                        5⤵
                          PID:3376
                        • C:\Windows\system32\ctfmon.exe
                          ctfmon.exe
                          5⤵
                            PID:3508
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:2
                            5⤵
                              PID:3560
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:8
                              5⤵
                                PID:3580
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1588 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:8
                                5⤵
                                  PID:3620
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2452 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3896
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1492 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3140
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2776 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:1
                                  5⤵
                                  • Uses browser remote debugging
                                  PID:3212
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1324 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:2
                                  5⤵
                                    PID:3940
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3812 --field-trial-handle=1256,i,11275562565261823684,15384927213793115474,131072 /prefetch:8
                                    5⤵
                                      PID:3964
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\GCBKFBFCGI.exe"
                                    4⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:3660
                                    • C:\Users\Admin\Documents\GCBKFBFCGI.exe
                                      "C:\Users\Admin\Documents\GCBKFBFCGI.exe"
                                      5⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3948
                                • C:\Users\Admin\AppData\Local\Temp\1013118001\48ec776510.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1013118001\48ec776510.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:3000
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2540
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2656
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1408
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1620
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:584
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    4⤵
                                      PID:2040
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2536
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.0.1333571195\739073743" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1f7fa37-a053-4861-ab37-25b2bbee67c3} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 1316 14203b58 gpu
                                          6⤵
                                            PID:2940
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.1.2047832208\300791520" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1528 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d1d5645-5aa7-413d-99d4-0101086e7e83} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 1544 d74b58 socket
                                            6⤵
                                              PID:1952
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.2.836383225\773691030" -childID 1 -isForBrowser -prefsHandle 1864 -prefMapHandle 1860 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {20fffe8e-f7dc-407d-bc63-6469a6c75ce6} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 1876 19054a58 tab
                                              6⤵
                                                PID:1592
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.3.1908420127\1492301764" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2616 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bad89264-0fa0-4c96-9c9a-1f5949cc8776} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 2636 1caf3e58 tab
                                                6⤵
                                                  PID:2196
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.4.918574131\1559801593" -childID 3 -isForBrowser -prefsHandle 3904 -prefMapHandle 3908 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c4bdbbf5-39fc-4d4e-96cd-039108cf1839} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 3920 20fa8358 tab
                                                  6⤵
                                                    PID:2748
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.5.485938792\552006950" -childID 4 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ee27049-1857-42a7-af5e-6f77fd74c335} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 4004 1b629d58 tab
                                                    6⤵
                                                      PID:1704
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2536.6.1164076018\2140949852" -childID 5 -isForBrowser -prefsHandle 4180 -prefMapHandle 4184 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 632 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {93d7ae42-ae50-4543-b784-8d186f8f88e3} 2536 "\\.\pipe\gecko-crash-server-pipe.2536" 4168 2047d758 tab
                                                      6⤵
                                                        PID:2424
                                                • C:\Users\Admin\AppData\Local\Temp\1013119001\9585d2d0b5.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1013119001\9585d2d0b5.exe"
                                                  3⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2320
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:2688
                                              • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                                1⤵
                                                  PID:3136

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\ProgramData\IJEHIDHDAKJDHJKEBFIE

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  1eec65188571cca26c4cf311cadea4c6

                                                  SHA1

                                                  6c0a2fbfe421d11e1ddb1c7039a0c5e6f0103ba3

                                                  SHA256

                                                  bb82ebb73110c8d9d23e532438fe0d2b696aa8e229c0901661709e52512819f5

                                                  SHA512

                                                  9fe72bb12efc144f7e60846d9bc44a548e544780212b9d78b3704937ff3d05e172df4fb6fa2701b5d0263f26150d26864d4a8811f45c71681c7e3bcdc3a31ce1

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  40B

                                                  MD5

                                                  a5ff7b8d3f9da95f3edc95416ad0ee3a

                                                  SHA1

                                                  a1d3fb57133e5369e14db282af76e1c6593cc9b2

                                                  SHA256

                                                  7237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd

                                                  SHA512

                                                  d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extension State\000007.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  18e723571b00fb1694a3bad6c78e4054

                                                  SHA1

                                                  afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                  SHA256

                                                  8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                  SHA512

                                                  43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  df10dcb2f912afa393befb71fdb6b2c0

                                                  SHA1

                                                  a5ad3594ebc7235a1edb8fcb4e19db7982e0c841

                                                  SHA256

                                                  8803e234ee073e1866d78cb1fa84babdbb1c2b15e16ef39514c1da73d3529ae6

                                                  SHA512

                                                  081efed7aeb00d12bcb3d33f6bd9b4e0ccb76c0df647df4a8e4a041690b194b50fbc9edf6f2db12792cf4948111976fbf794c79132ad809402730e87e7a37224

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index

                                                  Filesize

                                                  24B

                                                  MD5

                                                  54cb446f628b2ea4a5bce5769910512e

                                                  SHA1

                                                  c27ca848427fe87f5cf4d0e0e3cd57151b0d820d

                                                  SHA256

                                                  fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d

                                                  SHA512

                                                  8f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Code Cache\wasm\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  f6c973df713e85b5ff9446e6b2a7f95f

                                                  SHA1

                                                  47ab973301bf26010aa8da1255c75af9e662273d

                                                  SHA256

                                                  ffd30d0a45c4c4ed84037ff81846cff39b75a2656b9454618915d29700e50c0b

                                                  SHA512

                                                  efd35ccd99c4bb1ead1c785f3380db4ce08167817eba472b0582a1c29210d9af788a6150520c933869d0a3e67105558dc6ca890c0a4e1132e8dc94037597bc21

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Favicons

                                                  Filesize

                                                  20KB

                                                  MD5

                                                  3eea0768ded221c9a6a17752a09c969b

                                                  SHA1

                                                  d17d8086ed76ec503f06ddd0ac03d915aec5cdc7

                                                  SHA256

                                                  6923fd51e36b8fe40d6d3dd132941c5a693b02f6ae4d4d22b32b5fedd0e7b512

                                                  SHA512

                                                  fb5c51adf5a5095a81532e3634f48f5aedb56b7724221f1bf1ccb626cab40f87a3b07a66158179e460f1d0e14eeb48f0283b5df6471dd7a6297af6e8f3efb1f9

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\000003.log

                                                  Filesize

                                                  46B

                                                  MD5

                                                  90881c9c26f29fca29815a08ba858544

                                                  SHA1

                                                  06fee974987b91d82c2839a4bb12991fa99e1bdd

                                                  SHA256

                                                  a2ca52e34b6138624ac2dd20349cde28482143b837db40a7f0fbda023077c26a

                                                  SHA512

                                                  15f7f8197b4fc46c4c5c2570fb1f6dd73cb125f9ee53dfa67f5a0d944543c5347bdab5cce95e91dd6c948c9023e23c7f9d76cff990e623178c92f8d49150a625

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  192B

                                                  MD5

                                                  4d3f7dd7ce07609cc5c917d53db80e57

                                                  SHA1

                                                  522ed4a9ebaa0ba99e71e7226ce9b6cb5959c429

                                                  SHA256

                                                  c1f6dbc4d4954de255bb6b6f335179162f3738639b1237f53aa1a38ec1873925

                                                  SHA512

                                                  b2ba08bdeb106eee540dfba248d04b7b9d622d7fde8e1372556ce8d2a5011fa47d033eef5c3c5cbfeefd7c55a9c3dc3c7f42048b4c0053381a1bee96f398ae58

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000001

                                                  Filesize

                                                  41B

                                                  MD5

                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                  SHA1

                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                  SHA256

                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                  SHA512

                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\MANIFEST-000002

                                                  Filesize

                                                  50B

                                                  MD5

                                                  22bf0e81636b1b45051b138f48b3d148

                                                  SHA1

                                                  56755d203579ab356e5620ce7e85519ad69d614a

                                                  SHA256

                                                  e292f241daafc3df90f3e2d339c61c6e2787a0d0739aac764e1ea9bb8544ee97

                                                  SHA512

                                                  a4cf1f5c74e0df85dda8750be9070e24e19b8be15c6f22f0c234ef8423ef9ca3db22ba9ef777d64c33e8fd49fada6fcca26c1a14ba18e8472370533a1c65d8d0

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  f3315dd04868295f7ffdcd8f48062efd

                                                  SHA1

                                                  59e8deaada4cd4e6f5056e686a6fbf8785fe6009

                                                  SHA256

                                                  58d37d7f41820867f34c0afcf6b658075d7afb04aec4b8e81bc3876b5dd0b1f1

                                                  SHA512

                                                  6347c73d33247d0ce7a074068830f06febbe1ea87cabc396bbb75c2444db3202bd568c4db8091f5c51fe2f8ed569520f00237eb2533e5a001ab6c605eca41fd8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Web Data

                                                  Filesize

                                                  88KB

                                                  MD5

                                                  11b6879796f062d38ba0ec2de7680830

                                                  SHA1

                                                  ecb0f97f93f8f882966a56589162e328e2c8211f

                                                  SHA256

                                                  871b3dbd6548fda17acf2dcdc284bcd6a118e6f547f0702c801710f268743a61

                                                  SHA512

                                                  ed54facfe77e0491a8102d2846b1854aee645e1848db39b11951555d013984de710c715936518cf04cb5dc0fcc7846dcddb017bba9d299c915008532782034f8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                  Filesize

                                                  14B

                                                  MD5

                                                  9eae63c7a967fc314dd311d9f46a45b7

                                                  SHA1

                                                  caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                                                  SHA256

                                                  4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                                                  SHA512

                                                  bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                  Filesize

                                                  264KB

                                                  MD5

                                                  f50f89a0a91564d0b8a211f8921aa7de

                                                  SHA1

                                                  112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                  SHA256

                                                  b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                  SHA512

                                                  bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Affiliation Database

                                                  Filesize

                                                  32KB

                                                  MD5

                                                  69e3a8ecda716584cbd765e6a3ab429e

                                                  SHA1

                                                  f0897f3fa98f6e4863b84f007092ab843a645803

                                                  SHA256

                                                  e0c9f1494a417f356b611ec769b975a4552c4065b0bc2181954fcbb4b3dfa487

                                                  SHA512

                                                  bb78069c17196da2ce8546046d2c9d9f3796f39b9868b749ecada89445da7a03c9b54a00fcf34a23eb0514c871e026ac368795d2891bbf37e1dc5046c29beaaa

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  d3eb308ff6d920c1dd72841c64f73094

                                                  SHA1

                                                  150a8cfbef8470163d34d9da4fe1886ea0677f14

                                                  SHA256

                                                  ef5aa639b3e99901ae0f6445b8c7fba4e57229c74ff6b2230700479cdcdfd59f

                                                  SHA512

                                                  34b5737af0b1253372b4dd69972379f4d29c22465db280877402a938583aaaa1949aeb0c33296256aa27d299ce6390808864849b6844d7957a54a63c1586ddb7

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Code Cache\wasm\index-dir\the-real-index

                                                  Filesize

                                                  48B

                                                  MD5

                                                  cdd749cbef5e8601186be69749c7ea69

                                                  SHA1

                                                  77d2e64f3fc12f22fe2f02fa6227caac4ac3a170

                                                  SHA256

                                                  be4899798c53c2edec7336dbb18e3c409a26c7a958a34be08e9a89b3b038c166

                                                  SHA512

                                                  bbe2737263886f487157e41154a534971583485fc2986e591f5dfcbb609b133a6c48ba9acea0a6cc1894ff668dcf56f9f09a6cee137ee0bad644f5da4e7da082

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Extension Scripts\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  ffe60b6e22824f47313985ecb111a4f4

                                                  SHA1

                                                  608d00d4b95a3a65a2de46640dc98a6c6e86fae3

                                                  SHA256

                                                  4321aa63b069e52d71dccce23f133e2cc91788d89ec737509782bda5c6f21dc7

                                                  SHA512

                                                  1e6d77378d1b08fbb2971859cb0455994c00246a9f9e007fff6d83dbbda97dadb85627a0def67cda80adbf9c19bb8decb37a1948a39aa70c063876aebc8de536

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\History

                                                  Filesize

                                                  148KB

                                                  MD5

                                                  90a1d4b55edf36fa8b4cc6974ed7d4c4

                                                  SHA1

                                                  aba1b8d0e05421e7df5982899f626211c3c4b5c1

                                                  SHA256

                                                  7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                                                  SHA512

                                                  ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Login Data For Account

                                                  Filesize

                                                  46KB

                                                  MD5

                                                  02d2c46697e3714e49f46b680b9a6b83

                                                  SHA1

                                                  84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                  SHA256

                                                  522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                  SHA512

                                                  60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  206702161f94c5cd39fadd03f4014d98

                                                  SHA1

                                                  bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                  SHA256

                                                  1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                  SHA512

                                                  0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000003.log

                                                  Filesize

                                                  40B

                                                  MD5

                                                  148079685e25097536785f4536af014b

                                                  SHA1

                                                  c5ff5b1b69487a9dd4d244d11bbafa91708c1a41

                                                  SHA256

                                                  f096bc366a931fba656bdcd77b24af15a5f29fc53281a727c79f82c608ecfab8

                                                  SHA512

                                                  c2556034ea51abfbc172eb62ff11f5ac45c317f84f39d4b9e3ddbd0190da6ef7fa03fe63631b97ab806430442974a07f8e81b5f7dc52d9f2fcdc669adca8d91f

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000004.dbtmp

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\LOG

                                                  Filesize

                                                  205B

                                                  MD5

                                                  17125f0430998d0330b8b398adc62297

                                                  SHA1

                                                  6cc6e84e7f2e732beadfcc52db58a5b8d32482c4

                                                  SHA256

                                                  f0ecbf171fe275a24c1eb9b563a925f8881895de1c8ae810a2859d9d40242b41

                                                  SHA512

                                                  88a5076232f898e52299f5a4fd85972e5cad46fbe0939e75ee10474709c6d1cb64b268b8691aa51164112d5b92dee7fcd8397641cc1c96b68f15f66fa5198bc8

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\CURRENT~RFf771738.TMP

                                                  Filesize

                                                  16B

                                                  MD5

                                                  46295cac801e5d4857d09837238a6394

                                                  SHA1

                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                  SHA256

                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                  SHA512

                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Sync Data\LevelDB\LOG

                                                  Filesize

                                                  193B

                                                  MD5

                                                  c0b3ac851465eda65f7d721f74ec0e4e

                                                  SHA1

                                                  60feeb7ee1f0e5d7ca4b46687ba3a80e6e4a745a

                                                  SHA256

                                                  69a343ae372456485fe9b49c90937f40171ab01b12396c61c3922a97363512fe

                                                  SHA512

                                                  c21b13686c5c9ffde9a2f88a7cefc045fd23d543cb0829d006f44e97ab0ce55108b4a5239c494e397fbb982eca4166ee004fd9da381d0c10b9b805e2e3790fcc

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Visited Links

                                                  Filesize

                                                  128KB

                                                  MD5

                                                  6cf4f7a8023319a055275dbc8250488c

                                                  SHA1

                                                  e75cd8f16ff4aa301cd4c97660562cf6af58a161

                                                  SHA256

                                                  2947f92772d7dd69e221d728bd27c4dad4cb7775120de7ccdf78c4299abb44a8

                                                  SHA512

                                                  5cf507512073bf30cc99de0304421dd66789d168f96847c4edcb25d258b406c73f4e19bfc3b55e4f91a1fb9095ce39f12e5d8453a95797b5c847d6e7197f9337

                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                                                  Filesize

                                                  86B

                                                  MD5

                                                  961e3604f228b0d10541ebf921500c86

                                                  SHA1

                                                  6e00570d9f78d9cfebe67d4da5efe546543949a7

                                                  SHA256

                                                  f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed

                                                  SHA512

                                                  535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\activity-stream.discovery_stream.json.tmp

                                                  Filesize

                                                  32KB

                                                  MD5

                                                  1078f2466bc522524570f7c2774264dd

                                                  SHA1

                                                  d1f38d2f92b340dd43bc12a1eab28a4d08bbcae3

                                                  SHA256

                                                  369546eac05130a93f1b462bb4e94538d33320c9b14e3c029ee5c9276088c164

                                                  SHA512

                                                  a593e4b9bb5ba8100ac9acd31e98539afaba9ae97e421418ab220a5b0f0acf60ac73fb7081fd233e25c22e8380a4f066b4311695668aedae1b2bd8e9cb0ca824

                                                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\o97f221x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                  Filesize

                                                  15KB

                                                  MD5

                                                  96c542dec016d9ec1ecc4dddfcbaac66

                                                  SHA1

                                                  6199f7648bb744efa58acf7b96fee85d938389e4

                                                  SHA256

                                                  7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                  SHA512

                                                  cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                • C:\Users\Admin\AppData\Local\Temp\1013116001\a1a021c621.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  477b786c55ec776c0c2d3416bb905197

                                                  SHA1

                                                  db2c3b98ab0f1acb2c98f195cb3335baa10d6c03

                                                  SHA256

                                                  d6d6e3c25fe6fa50aeb98b6391c233009e81e8e90e91b6f47ec1d972e14780c2

                                                  SHA512

                                                  6d4ed2ec263f077a86339a0266e31d409de3cbea2affeb4aedefcd50c0e22eda3c47e3b44997aec4c23ee1874aeb89dc433c567cab77ece83ffbb6b5522ea030

                                                • C:\Users\Admin\AppData\Local\Temp\1013117001\1fbe0a40b7.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  506f8e1a147fa0fe3fa3cebb9152cd8f

                                                  SHA1

                                                  c5049f50f6b40392d3477bbf29f3a6c5f38e44e6

                                                  SHA256

                                                  3751a2c80b682cd6ff24d123ccb2dab108704ddb73e21df93a6c68815043d220

                                                  SHA512

                                                  6c6359772c620838b8070e34206cccb164e0d9691ba931af6af77f5dc5e367ae0bfd24c020c12c3363d2deda2efed7f59633952e8379f1344c832d190a37ad9b

                                                • C:\Users\Admin\AppData\Local\Temp\1013118001\48ec776510.exe

                                                  Filesize

                                                  945KB

                                                  MD5

                                                  29301fa4f7282afc36d8d73ba5308252

                                                  SHA1

                                                  26ea50e88d3dee6f5ddfa7b32d5e92d6b908267e

                                                  SHA256

                                                  7adcc174237fb93cf4ac0132e3c5e7b2b6f05a8e38010a7a1c0e8f404d99efa9

                                                  SHA512

                                                  8a2fa1b14590038e4d075b52bae396be3af270607649726b862f816fa1d23add6129a04199c1660e30a1ecc02ea6a54ce5647a106258bb0f609afaa58d471b84

                                                • C:\Users\Admin\AppData\Local\Temp\1013119001\9585d2d0b5.exe

                                                  Filesize

                                                  2.7MB

                                                  MD5

                                                  73d2678135b183714dda78c20567720d

                                                  SHA1

                                                  623ac92dcedd6ef4bcf1c9f19b42cf9765c2b133

                                                  SHA256

                                                  b77b120502581dcdb215741cff5dadcbc7b0d02c00cdf01c224ebe1cd7cd953e

                                                  SHA512

                                                  be898eaa84a345132de95aa983cad4e527e5cd6ce5616d9368ae9f5a8b9e92207635288eef98d8a65f724fe8f928ad800aeb945d10ebde7facd13721ed542e99

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                  Filesize

                                                  442KB

                                                  MD5

                                                  85430baed3398695717b0263807cf97c

                                                  SHA1

                                                  fffbee923cea216f50fce5d54219a188a5100f41

                                                  SHA256

                                                  a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                  SHA512

                                                  06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                  Filesize

                                                  8.0MB

                                                  MD5

                                                  a01c5ecd6108350ae23d2cddf0e77c17

                                                  SHA1

                                                  c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                  SHA256

                                                  345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                  SHA512

                                                  b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\db\data.safe.bin

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  e2d9b399888b227f9f622398fd21d26c

                                                  SHA1

                                                  3945697af030af0c03f06f8ea1a018dfd733242a

                                                  SHA256

                                                  3ff95e100b668b62aac71cda15d0b884fbbd8725782ac6f324230ee1eb26cda4

                                                  SHA512

                                                  566bbeb402be100b075548cc79ca3278c6fa30be0a20861bd9248c687f3b3bb97fab601ed5de88948a3ccf6c2c2d8f260ae720754bc3500f284098d2a009f889

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\a78f6c38-1114-480a-bd75-c9f9f816dfbc

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  c5b2b7e6b8c822faccd7ad2c6a19f38d

                                                  SHA1

                                                  f1fee1214235571aea3aab466f192d053bbc22ae

                                                  SHA256

                                                  744743ea421c7fcf20005910950f8e0895e2be7538388de616768bd39c89be3f

                                                  SHA512

                                                  37e789b63439c773648cfb2183c50033a82c3ddef090fe33cfb9fc1c64539cbad6eb94940ace44302d2c615968284c78f22623351d6d9a9671135f7ee9dabe59

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\datareporting\glean\pending_pings\fe16c084-c874-4207-88a9-3fd3c1cc6d0e

                                                  Filesize

                                                  745B

                                                  MD5

                                                  ad2d860c72ec08379616a37bb0191260

                                                  SHA1

                                                  bdf926be93a10db7bd09a5a23b54fa4cf276abab

                                                  SHA256

                                                  1fce9480f0bed3dd02557a4fc5af57a24c9d4600102f6edb01e1f3215ef46cde

                                                  SHA512

                                                  a91f50bc97a6f34a8307222ba5830e43546b794fe4d27bc6807c315c820601f188847e228f9f8f534c24b8b1413dc7a95a9d0d71196d024bff36aa4c3142a9fd

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                  Filesize

                                                  997KB

                                                  MD5

                                                  fe3355639648c417e8307c6d051e3e37

                                                  SHA1

                                                  f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                  SHA256

                                                  1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                  SHA512

                                                  8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                  Filesize

                                                  116B

                                                  MD5

                                                  3d33cdc0b3d281e67dd52e14435dd04f

                                                  SHA1

                                                  4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                  SHA256

                                                  f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                  SHA512

                                                  a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                  Filesize

                                                  479B

                                                  MD5

                                                  49ddb419d96dceb9069018535fb2e2fc

                                                  SHA1

                                                  62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                  SHA256

                                                  2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                  SHA512

                                                  48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                  Filesize

                                                  372B

                                                  MD5

                                                  8be33af717bb1b67fbd61c3f4b807e9e

                                                  SHA1

                                                  7cf17656d174d951957ff36810e874a134dd49e0

                                                  SHA256

                                                  e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                  SHA512

                                                  6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                  Filesize

                                                  11.8MB

                                                  MD5

                                                  33bf7b0439480effb9fb212efce87b13

                                                  SHA1

                                                  cee50f2745edc6dc291887b6075ca64d716f495a

                                                  SHA256

                                                  8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                  SHA512

                                                  d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  688bed3676d2104e7f17ae1cd2c59404

                                                  SHA1

                                                  952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                  SHA256

                                                  33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                  SHA512

                                                  7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  937326fead5fd401f6cca9118bd9ade9

                                                  SHA1

                                                  4526a57d4ae14ed29b37632c72aef3c408189d91

                                                  SHA256

                                                  68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                  SHA512

                                                  b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  0e22ed4b3ae087df92125d412bd8f12a

                                                  SHA1

                                                  18fbf8359c868e0886e007c6a2e99e0968853602

                                                  SHA256

                                                  9fb34f390628bdf3c830cae0489ac77c7ccd739b632b414e50a850a0bd789b5f

                                                  SHA512

                                                  f2bd4df1b0ac4538e9cd27be1c1aab9c746420b9755e2c62474b8178a935cbf767fcbfa7a40586e5e6be9f52748efc06fef5a1eee86946e3c75c8c46d2283968

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs-1.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  d50004275455920902e8ff916b32f158

                                                  SHA1

                                                  1c6eebdbbaaea7b7b681aa9e341eb91597f8c241

                                                  SHA256

                                                  b63ea4e96b1e16a823bbf0840bcdbedc0028a7f5137f5bd590deaedeff695859

                                                  SHA512

                                                  d602cacc5805f0aaddfee39aad7abd4d6ce646ff2c48bf4b27b0249a1cf5fdc438c5b593b5a4e23128ab46e7234afef531e50d608f60aa465eb31447532a5ceb

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\prefs.js

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  073ef30eb9817a48856ac0a71bd2c748

                                                  SHA1

                                                  973531b4148cc20a3092957c519ab91d62851e14

                                                  SHA256

                                                  ab64d3899939f7cbd4f5a79aa3155f0ff8c9d8be83ee73468a6a7d4eccf8bb73

                                                  SHA512

                                                  19598aadc4038e13be20cd149949f1eb55534c805de6e14dc5ec210dc72da77784668dc615d571da74c50bde33158fa7f6ac6d8aa7be1471f023fdd9a4f04317

                                                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\o97f221x.default-release\sessionstore-backups\recovery.jsonlz4

                                                  Filesize

                                                  4KB

                                                  MD5

                                                  7d27647a383259106672940bf517afd2

                                                  SHA1

                                                  e52ac6a0621ba51a99f7f3e59322bc0785703065

                                                  SHA256

                                                  80f35ccf693310f6d35f65e270468fa7263bb0d1c268277229bcd512e157ef5e

                                                  SHA512

                                                  f3faa8c1adfd178be6a69ec344274d9def7f8777fefddcbb737702b95a1685b6426e866d4bbe97acc74f819a706c38ee4a309b9c0ac816a3cb5505d45d4083ff

                                                • \Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  b1d16474d1cce3a573026500af7cdd09

                                                  SHA1

                                                  edbfb0ba0fb68b51ba33d881874efdf780d107d7

                                                  SHA256

                                                  9f29fb0df6f61aaecd024f58f699e9952d00ffc004af1764740c9eccea66d6a8

                                                  SHA512

                                                  c779a79fd10acf03519843c79aec40b36a2304a84534288f79f410642c22afa0f6d9bb6b90cd4bfb00e97d97d9da713e1189741f83361bcc0456520982a238f9

                                                • memory/1616-40-0x0000000000930000-0x0000000000DC9000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1616-45-0x0000000000930000-0x0000000000DC9000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2320-341-0x0000000000FE0000-0x00000000012A4000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2320-415-0x0000000000FE0000-0x00000000012A4000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2320-416-0x0000000000FE0000-0x00000000012A4000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2320-704-0x0000000000FE0000-0x00000000012A4000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2320-681-0x0000000000FE0000-0x00000000012A4000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2348-745-0x0000000000BF0000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2348-64-0x0000000000BF0000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2348-709-0x0000000000BF0000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2348-67-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                  Filesize

                                                  972KB

                                                • memory/2348-432-0x0000000000BF0000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2348-487-0x0000000000BF0000-0x000000000129B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2740-65-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-846-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-63-0x0000000006970000-0x000000000701B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2740-66-0x0000000006970000-0x0000000006E09000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2740-44-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-42-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-41-0x0000000001311000-0x0000000001379000-memory.dmp

                                                  Filesize

                                                  416KB

                                                • memory/2740-39-0x0000000006970000-0x0000000006E09000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/2740-680-0x0000000006450000-0x0000000006714000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2740-679-0x0000000006450000-0x0000000006714000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2740-852-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-313-0x0000000006970000-0x000000000701B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2740-708-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-337-0x0000000006970000-0x000000000701B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/2740-339-0x0000000006450000-0x0000000006714000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2740-828-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-845-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-25-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-844-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-340-0x0000000006450000-0x0000000006714000-memory.dmp

                                                  Filesize

                                                  2.8MB

                                                • memory/2740-746-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-843-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-24-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-756-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-22-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-21-0x0000000001311000-0x0000000001379000-memory.dmp

                                                  Filesize

                                                  416KB

                                                • memory/2740-842-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-19-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-841-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-486-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-830-0x0000000001310000-0x000000000161C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/2740-61-0x0000000006970000-0x000000000701B000-memory.dmp

                                                  Filesize

                                                  6.7MB

                                                • memory/3056-3-0x0000000000A80000-0x0000000000D8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/3056-1-0x0000000077480000-0x0000000077482000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/3056-2-0x0000000000A81000-0x0000000000AE9000-memory.dmp

                                                  Filesize

                                                  416KB

                                                • memory/3056-5-0x0000000000A80000-0x0000000000D8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/3056-20-0x0000000000A81000-0x0000000000AE9000-memory.dmp

                                                  Filesize

                                                  416KB

                                                • memory/3056-18-0x0000000000A80000-0x0000000000D8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/3056-0-0x0000000000A80000-0x0000000000D8C000-memory.dmp

                                                  Filesize

                                                  3.0MB

                                                • memory/3660-748-0x0000000001F90000-0x00000000022B4000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/3660-737-0x0000000001F90000-0x00000000022B4000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/3948-744-0x0000000000810000-0x0000000000B34000-memory.dmp

                                                  Filesize

                                                  3.1MB

                                                • memory/3948-738-0x0000000000810000-0x0000000000B34000-memory.dmp

                                                  Filesize

                                                  3.1MB