Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2022 17:08
Static task
static1
Behavioral task
behavioral1
Sample
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe
Resource
win10v2004-20220721-en
General
-
Target
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe
-
Size
1.4MB
-
MD5
48d01d98ec485e09f5f93be69a3bcdab
-
SHA1
b9c8c101e77e285d1b93a7675d6a8e2e31c4fac2
-
SHA256
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10
-
SHA512
7fdb4382018d8b12f8b296ffeb13c4fe9d789b5abde04fde87243f0b20d9c82019dd042d38834de2e0f757197c8678a82597b667ca031ac7679213d8814d2185
Malware Config
Extracted
redline
nam3
103.89.90.61:18728
-
auth_value
64b900120bbceaa6a9c60e9079492895
Extracted
redline
@tag12312341
62.204.41.144:14096
-
auth_value
71466795417275fac01979e57016e277
Extracted
redline
4
31.41.244.134:11643
-
auth_value
a516b2d034ecd34338f12b50347fbd92
Extracted
vidar
53.3
1455
https://t.me/proabudabi
-
profile_id
1455
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 9 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe family_redline behavioral2/memory/1680-177-0x0000000000820000-0x0000000000864000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline C:\Program Files (x86)\Company\NewProduct\tag.exe family_redline behavioral2/memory/3352-194-0x0000000000BF0000-0x0000000000C34000-memory.dmp family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline C:\Program Files (x86)\Company\NewProduct\safert44.exe family_redline behavioral2/memory/540-203-0x0000000000600000-0x0000000000620000-memory.dmp family_redline -
Executes dropped EXE 10 IoCs
Processes:
real.exeF0geI.exenamdoitntn.exeromb_ro.exesafert44.exetag.exekukurzka9000.exepigmo.exehAphAsh.exeUSA1.exepid process 1948 real.exe 1384 F0geI.exe 1680 namdoitntn.exe 3044 romb_ro.exe 3352 safert44.exe 540 tag.exe 5148 kukurzka9000.exe 5336 pigmo.exe 5564 hAphAsh.exe 6012 USA1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Control Panel\International\Geo\Nation 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe -
Loads dropped DLL 5 IoCs
Processes:
pigmo.exeRundll32.exeRundll32.exepid process 5336 pigmo.exe 5336 pigmo.exe 5336 pigmo.exe 6116 Rundll32.exe 6128 Rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows\CurrentVersion\Run msedge.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 12 IoCs
Processes:
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exesetup.exedescription ioc process File opened for modification C:\Program Files (x86)\Company\NewProduct\tag.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\USA1.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\real.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\romb_ro.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\pigmo.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e903c2e2-c8d9-44b5-b6dc-8c75f13816df.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20220727190937.pma setup.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\F0geI.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe File opened for modification C:\Program Files (x86)\Company\NewProduct\safert44.exe 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 7032 3044 WerFault.exe romb_ro.exe 6280 1384 WerFault.exe F0geI.exe 6068 6128 WerFault.exe Rundll32.exe -
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_1 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_2 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_1 C:\Program Files (x86)\Company\NewProduct\pigmo.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
romb_ro.exereal.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 romb_ro.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString romb_ro.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 real.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString real.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
Processes:
msedge.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
msedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exeromb_ro.exeidentity_helper.exenamdoitntn.exetag.exesafert44.exereal.exemsedge.exepid process 5668 msedge.exe 5668 msedge.exe 5716 msedge.exe 5716 msedge.exe 5656 msedge.exe 5656 msedge.exe 5728 msedge.exe 5728 msedge.exe 5688 msedge.exe 5688 msedge.exe 5680 msedge.exe 5680 msedge.exe 5704 msedge.exe 5740 msedge.exe 5740 msedge.exe 5704 msedge.exe 5552 msedge.exe 5552 msedge.exe 3316 msedge.exe 3316 msedge.exe 3044 romb_ro.exe 3044 romb_ro.exe 6184 identity_helper.exe 6184 identity_helper.exe 1680 namdoitntn.exe 1680 namdoitntn.exe 540 tag.exe 540 tag.exe 3352 safert44.exe 3352 safert44.exe 1948 real.exe 1948 real.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
msedge.exepid process 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe 3316 msedge.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
namdoitntn.exetag.exesafert44.exedescription pid process Token: SeDebugPrivilege 1680 namdoitntn.exe Token: SeDebugPrivilege 540 tag.exe Token: SeDebugPrivilege 3352 safert44.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msedge.exepid process 3316 msedge.exe 3316 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exemsedge.exedescription pid process target process PID 4356 wrote to memory of 4960 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 4960 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 5000 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 5000 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 1324 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 1324 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4960 wrote to memory of 4952 4960 msedge.exe msedge.exe PID 4960 wrote to memory of 4952 4960 msedge.exe msedge.exe PID 5000 wrote to memory of 2604 5000 msedge.exe msedge.exe PID 1324 wrote to memory of 836 1324 msedge.exe msedge.exe PID 5000 wrote to memory of 2604 5000 msedge.exe msedge.exe PID 1324 wrote to memory of 836 1324 msedge.exe msedge.exe PID 4356 wrote to memory of 1424 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 1424 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 1424 wrote to memory of 220 1424 msedge.exe msedge.exe PID 1424 wrote to memory of 220 1424 msedge.exe msedge.exe PID 4356 wrote to memory of 3316 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 3316 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 3316 wrote to memory of 1260 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 1260 3316 msedge.exe msedge.exe PID 4356 wrote to memory of 1712 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 1712 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 3348 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 3348 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 1712 wrote to memory of 3004 1712 msedge.exe msedge.exe PID 1712 wrote to memory of 3004 1712 msedge.exe msedge.exe PID 3348 wrote to memory of 2856 3348 msedge.exe msedge.exe PID 3348 wrote to memory of 2856 3348 msedge.exe msedge.exe PID 4356 wrote to memory of 1188 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 1188 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 4620 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 4356 wrote to memory of 4620 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe msedge.exe PID 1188 wrote to memory of 2308 1188 msedge.exe msedge.exe PID 1188 wrote to memory of 2308 1188 msedge.exe msedge.exe PID 4620 wrote to memory of 4224 4620 msedge.exe msedge.exe PID 4620 wrote to memory of 4224 4620 msedge.exe msedge.exe PID 4356 wrote to memory of 1948 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe real.exe PID 4356 wrote to memory of 1948 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe real.exe PID 4356 wrote to memory of 1948 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe real.exe PID 4356 wrote to memory of 1384 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe F0geI.exe PID 4356 wrote to memory of 1384 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe F0geI.exe PID 4356 wrote to memory of 1384 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe F0geI.exe PID 4356 wrote to memory of 1680 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe namdoitntn.exe PID 4356 wrote to memory of 1680 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe namdoitntn.exe PID 4356 wrote to memory of 1680 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe namdoitntn.exe PID 4356 wrote to memory of 3044 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe romb_ro.exe PID 4356 wrote to memory of 3044 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe romb_ro.exe PID 4356 wrote to memory of 3044 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe romb_ro.exe PID 4356 wrote to memory of 3352 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe safert44.exe PID 4356 wrote to memory of 3352 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe safert44.exe PID 4356 wrote to memory of 3352 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe safert44.exe PID 4356 wrote to memory of 540 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe tag.exe PID 4356 wrote to memory of 540 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe tag.exe PID 4356 wrote to memory of 540 4356 9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe tag.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe PID 3316 wrote to memory of 5136 3316 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe"C:\Users\Admin\AppData\Local\Temp\9bc8a9f52041123c3c471dd111a2ce0ee39eaf5e59d7949826d08601a3511f10.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1n7LH42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,14212435010988874179,1564540096083768300,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,14212435010988874179,1564540096083768300,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1A4aK42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,9486389317687303378,17413219883367296509,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,9486389317687303378,17413219883367296509,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,8132726157481837406,11349474131777895083,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,8132726157481837406,11349474131777895083,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RchC42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,12172741811562448320,15966044599091409324,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,12172741811562448320,15966044599091409324,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47183⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RiLC42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2156,13082160131742585037,15573337086529078732,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:23⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2156,13082160131742585037,15573337086529078732,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47183⤵
-
C:\Program Files (x86)\Company\NewProduct\real.exe"C:\Program Files (x86)\Company\NewProduct\real.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"C:\Program Files (x86)\Company\NewProduct\romb_ro.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 13763⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\safert44.exe"C:\Program Files (x86)\Company\NewProduct\safert44.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exe"C:\Program Files (x86)\Company\NewProduct\pigmo.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\libnspr4.dll,PR_DestroyRWLock3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6128 -s 6524⤵
- Program crash
-
C:\Windows\SysWOW64\Rundll32.exeRundll32.exe C:\Users\Admin\AppData\Local\Temp\clip.dll,PR_DestroyRWLock3⤵
- Loads dropped DLL
-
C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe"C:\Program Files (x86)\Company\NewProduct\hAphAsh.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Company\NewProduct\tag.exe"C:\Program Files (x86)\Company\NewProduct\tag.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"C:\Program Files (x86)\Company\NewProduct\namdoitntn.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exe"C:\Program Files (x86)\Company\NewProduct\F0geI.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 10403⤵
- Program crash
-
C:\Program Files (x86)\Company\NewProduct\USA1.exe"C:\Program Files (x86)\Company\NewProduct\USA1.exe"2⤵
- Executes dropped EXE
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1nCCJ42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RyjC42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RCgX42⤵
- Adds Run key to start application
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8528 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6724 /prefetch:13⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8796 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff6d4105460,0x7ff6d4105470,0x7ff6d41054804⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=9192 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6840 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=8784 /prefetch:83⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/1RLtX42⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xd4,0x10c,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47181⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47181⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3103142377598620149,3326150019055582601,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:21⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,15860485968653778444,4085860929901308522,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:21⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,12524216867598719180,13763195349697092445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:21⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:21⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3488 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:11⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:11⤵
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4920 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:11⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,15860485968653778444,4085860929901308522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3103142377598620149,3326150019055582601,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,12524216867598719180,13763195349697092445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:31⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47181⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2180,15909730759117831332,10074856594890201928,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=7048 /prefetch:81⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6b6f46f8,0x7ffc6b6f4708,0x7ffc6b6f47181⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3044 -ip 30441⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1384 -ip 13841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 6128 -ip 61281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
C:\Program Files (x86)\Company\NewProduct\F0geI.exeFilesize
290KB
MD58ab8fc20b7ab8b18bf0f474cc0156523
SHA121b922f6dcd49b67b5b3abc9603ec90835e7a20d
SHA256b8849a951aadc7c35e1d1b8c57064b49a5eddf54928419b21f18584263162fca
SHA512ab1ffba707911c50b2ac609c0736560ad2a37dd71f87597af5a87eae3c1811309f3973ecfc0b68cb5d234dd374d771e55637bd84748291758f932dc088def9d2
-
C:\Program Files (x86)\Company\NewProduct\USA1.exeFilesize
289KB
MD588cd972f3dd0b2e4288276d1be359f23
SHA1d399895b0193cfb903dd6edc6f15bc8f6afdebec
SHA2567519f74f46204d75acc6aef962c40885b49d1a4572d4215aec1bce96417c1743
SHA5123eea0b9d18644740bbf4b541cf051c2bd797ad805118f90ed91fac2e173ed5fc4c5cc26ebd5334d58020e41b6385f693269df8fc637d53e3436b96ec99f3320c
-
C:\Program Files (x86)\Company\NewProduct\USA1.exeFilesize
289KB
MD588cd972f3dd0b2e4288276d1be359f23
SHA1d399895b0193cfb903dd6edc6f15bc8f6afdebec
SHA2567519f74f46204d75acc6aef962c40885b49d1a4572d4215aec1bce96417c1743
SHA5123eea0b9d18644740bbf4b541cf051c2bd797ad805118f90ed91fac2e173ed5fc4c5cc26ebd5334d58020e41b6385f693269df8fc637d53e3436b96ec99f3320c
-
C:\Program Files (x86)\Company\NewProduct\hAphAsh.exeFilesize
290KB
MD53edc9ccbc5593e1b9a28c58e0f62e950
SHA1169913831e1864ea24800bd74a5175e9caf8cba4
SHA2568de5ec8cd5e2a45bb17544e9974d87ab140514e3852284d0c07534b7d39d923d
SHA5128c503af6fd91f6ee3f045c4b5ab2f77d6c492ed563d535af09edc8c80e695fa0c9180ad9e42f149f93f69017115726fbfd0e3b7c2bd2eed93791b8742a7a8ab4
-
C:\Program Files (x86)\Company\NewProduct\hAphAsh.exeFilesize
290KB
MD53edc9ccbc5593e1b9a28c58e0f62e950
SHA1169913831e1864ea24800bd74a5175e9caf8cba4
SHA2568de5ec8cd5e2a45bb17544e9974d87ab140514e3852284d0c07534b7d39d923d
SHA5128c503af6fd91f6ee3f045c4b5ab2f77d6c492ed563d535af09edc8c80e695fa0c9180ad9e42f149f93f69017115726fbfd0e3b7c2bd2eed93791b8742a7a8ab4
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD54bb92f1ae6e62f60d99d305929807c49
SHA1b304564cb3f9a96673d853b5f30c04e7b7898b76
SHA25661767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2
SHA5129bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d
-
C:\Program Files (x86)\Company\NewProduct\kukurzka9000.exeFilesize
1.5MB
MD54bb92f1ae6e62f60d99d305929807c49
SHA1b304564cb3f9a96673d853b5f30c04e7b7898b76
SHA25661767fbbe32991e95bd9da2309a09795d61e70cfe9bf2762a1d11f58ef524ce2
SHA5129bb31bf563d7e32885ef41df7652775a4e37b5e4b24e75a862052b5e0a5572f7e90695aa100c93ca485f7fb80214d23f6b5ea2aab33b5877afbaa6bad012d25d
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\namdoitntn.exeFilesize
245KB
MD5b16134159e66a72fb36d93bc703b4188
SHA1e869e91a2b0f77e7ac817e0b30a9a23d537b3001
SHA256b064af166491cb307cfcb9ce53c09696d9d3f6bfa65dfc60b237c275be9b655c
SHA5123fdf205ca16de89c7ed382ed42f628e1211f3e5aff5bf7dedc47927f3dd7ff54b0dd10b4e8282b9693f45a5ee7a26234f899d14bfd8eb0fd078b42a4ed8b8b4c
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exeFilesize
59KB
MD570730b152cfc9df1fb3884b52d13135f
SHA1a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b
SHA256bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd
SHA51278016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903
-
C:\Program Files (x86)\Company\NewProduct\pigmo.exeFilesize
59KB
MD570730b152cfc9df1fb3884b52d13135f
SHA1a6b9b07c5897b3d9046d48cfa3e4f5ccbfae5a6b
SHA256bc575c0ec677d0271d56b6540808bfad5b420222a090837b0519b90c1d8ca6dd
SHA51278016e57e2eec044fe5fbe07c1d53fd57c31eee0473aa8014c593f344d9059c2948b6a3e41afbadaad2e42006e9a7e0ed6078e0e95823481d0b81b21e7056903
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5cf25b95144c2766ff8d6af9439b77596
SHA1467cfb3e63b9da2b1c03bc712ab08cdb8fa71034
SHA256df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c
SHA512bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d
-
C:\Program Files (x86)\Company\NewProduct\real.exeFilesize
289KB
MD5cf25b95144c2766ff8d6af9439b77596
SHA1467cfb3e63b9da2b1c03bc712ab08cdb8fa71034
SHA256df0b62403f7a1e666b759a3c174141defe61e275263637729f56749f524a514c
SHA512bee60a1439e7ed944aca13424a2b4a835608ba05035e6594e711e036427b4243687eebffa1318c5412408919fd21e23179447bc190d5e9efb222f3a41649975d
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD56adc24e326546ccd86472a3d4ccf03db
SHA15094a1723aa4cfdc03cedc7ed64236969b82d588
SHA256c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4
SHA512aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce
-
C:\Program Files (x86)\Company\NewProduct\romb_ro.exeFilesize
289KB
MD56adc24e326546ccd86472a3d4ccf03db
SHA15094a1723aa4cfdc03cedc7ed64236969b82d588
SHA256c4a34d485a31f3b38a7107f53f37586e0e4845a13f02c579ca3fe695d38447d4
SHA512aacaecd6d1cbac8ac18bdf8313bb06c124e44c720219a5b1b8d2d0178b9be3222faf2375b4445ed0cc455431642fc94d466fd65cc9460712bb87c922f26896ce
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\safert44.exeFilesize
244KB
MD5dbe947674ea388b565ae135a09cc6638
SHA1ae8e1c69bd1035a92b7e06baad5e387de3a70572
SHA25686aeac2a4ee8e62265ee570718bbd41a4e643e0bad69e7b4fa6c24baeb220709
SHA51267441aebbf7ce4d53fbb665124f309faed7842b3e424e018454ff6d6f790219633ce6a9b370aeaf77c5092e84f4391df13e964ca6a28597810dee41c3c833893
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Program Files (x86)\Company\NewProduct\tag.exeFilesize
107KB
MD52ebc22860c7d9d308c018f0ffb5116ff
SHA178791a83f7161e58f9b7df45f9be618e9daea4cd
SHA2568e2c9fd68fc850fa610d1edfd46fc4a66adbef24e42a1841290b0e0c08597e89
SHA512d4842627f6fab09f9472ed0b09b5e012524bf6b821d90a753275f68de65b7ba084a9e15daca58a183f89b166cc9d2d2f2d6a81e1110e66c5822b548279c8c05e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5350bf115f2e2fd3b19d74575eaa1b540
SHA16e630a7ca93e5668abf28f63f8cafcd28614abbe
SHA256a6e4e8a6cc8eefa26fcb51644db6c7a9d800eb4a230bd8b7dfa0896026e4c29d
SHA512679dd585c134bd93085b2ccc436421f1f91316d7d54120cdc92033ff2b0a9c99ef7cc67fec3f0ba368fb19151de623d016863be7b315dc3bb846a9995b77cb85
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD5007709614bb3de70288cedc2bb85bc6e
SHA12b0049ace9237c72d5b068a07246870fbae9a41b
SHA2562159616661c7e0266d814763042fc6a1eb9f9b32783474fefc2171f1140e7ab1
SHA512cb523fa8dc7d42a942fcfdff8bcf97812f76de3451731c01b3fc435afe73e4f1ba9393d34a85984f0348d2aa39a4d1f5b194b71e323e934b2d3a16c60ed246a0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD512cd0c06946a0d3945d84b0e4f4222cf
SHA11179078b5754734bcd330e5c28e893d73c05212d
SHA2569362e0b47e8617633f75487455f61eea92114becb183f3f92b696322eb796002
SHA512bfad4680b20a3d653b712fb4b14ef814d1c70bc3a8677538c492a69a1958d7e50d6a59374084baef65ac300c3ecd62b80579737f5b29fd754d08477c3ce914ce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5d808ef0fb0b894080e0b680b4c49749a
SHA12ffeb6808c269bd0710ef6cf3418691bfad01f0f
SHA2562ac13eaa08431268317d60818639259bd589e3963a2a93c91a779afedf771724
SHA51264ee88d071013f218db250b7b73b82417937d7ba265ef87cf810971072b51e60ec223bab9927828ae7b97bcd15d20c2ffee737faa893d8595b66b09c144ee564
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5db8537e0d1d10dab1c360f587ea24287
SHA1765cfb75b3bc784878b64707af4fa5531a0e90d1
SHA2562efb49f968813efff200c1de6532bd843a721ab8141e0e6b4c62a0c7b4bf0d95
SHA51218e800bbadce7060e4813f01867f052ea2f4c33d5c054062c29bff89b7eec25d194dba76b169ea3b09e68854e0110890cb487a8df9880943d725fe1dfd74d6d3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD538920a78fc6aade1388c147b509a4b5f
SHA148fd2e337d505192e7a9ba1e7cbdd53046358d7e
SHA256d5a60b8f160f8932f0ba4cf6b080b4d893cbeef565e7903e68ce96eed074f715
SHA512a70a0c971ab54cd5f7e9fca96b7b5b9607a761c2a299198a4bba4fd242170249e4d4d9cc7cf965efe4e9ead1528f866c3a84f82187e4ab6a007c21398a291602
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD51f95790afd1fa02bb63d74a6309d81fe
SHA181df5a5e38d7b98f0a1148aa95d708acb0abe03c
SHA256786edcb4ddd270c8c4e4faa3c9ff2f9c18802e79c001faa860c00fb9d15b6cf7
SHA512805e1880c684532f254a5bdf3f1b14189f4e9bc58402b61eb4510f45c987ea9192801d772024499dc5842d6996be092b4265fe0e5bad2a42ba7e80224249bf4e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5f4a629319598bf85ed212a91e03d0d72
SHA18daba0070ff79e4abb1ed3bb8e04799fc4a77347
SHA256c72447aa68fec901a735361ee9b1d47ebbe41f1e0abe932cb2e8b3c64e0ba235
SHA512d096f08582ba7394852b972c270ac1d15b4ff2f507f70d54a9b46bee07a8d956241f13474caec4f3c1368c17c549036a810f0363b9bd3628753645fd94212ed5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD5d1e1479a5cb40e9330fcf7df5770be84
SHA1d873fa60b673cb8a8a7b0893ea7d82b5a0b50877
SHA2567e00d7ba10225b94da95711cb42f3e972b87091e5ea804d8e5a19b459ce2f42d
SHA5123c1630147e1bbd114942f3c468ce4099730a0f958b9201febce13e6afe6920267a56891fefd660bae5bec6c91177a6d9aa6eab1eb0586f8398779090f58bf8e1
-
C:\Users\Admin\AppData\Local\Temp\nsnF64D.tmp\System.dllFilesize
11KB
MD5fbe295e5a1acfbd0a6271898f885fe6a
SHA1d6d205922e61635472efb13c2bb92c9ac6cb96da
SHA256a1390a78533c47e55cc364e97af431117126d04a7faed49390210ea3e89dd0e1
SHA5122cb596971e504eaf1ce8e3f09719ebfb3f6234cea5ca7b0d33ec7500832ff4b97ec2bbe15a1fbf7e6a5b02c59db824092b9562cd8991f4d027feab6fd3177b06
-
\??\pipe\LOCAL\crashpad_1188_ZPDQYLYFJUJAIPZEMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_1324_AKFHMKZJEZOBWWSSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_1424_AKATEXHNSNVBULWGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_1712_WUYBANBZZLYJDIYZMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3316_QTYJRNAMVVOCSWDVMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_3348_OODNIUFEHCIBRHYJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4620_AGQTBTHZSKPHZLNNMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4960_JNPZKEVDTAITCNZHMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_5000_FNKKHHCGVMEIQDSFMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/220-137-0x0000000000000000-mapping.dmp
-
memory/540-263-0x0000000004EB0000-0x0000000004EEC000-memory.dmpFilesize
240KB
-
memory/540-259-0x0000000004E50000-0x0000000004E62000-memory.dmpFilesize
72KB
-
memory/540-320-0x0000000007D20000-0x000000000824C000-memory.dmpFilesize
5.2MB
-
memory/540-314-0x0000000005BF0000-0x0000000005C82000-memory.dmpFilesize
584KB
-
memory/540-317-0x0000000005BD0000-0x0000000005BEE000-memory.dmpFilesize
120KB
-
memory/540-262-0x0000000004F80000-0x000000000508A000-memory.dmpFilesize
1.0MB
-
memory/540-203-0x0000000000600000-0x0000000000620000-memory.dmpFilesize
128KB
-
memory/540-182-0x0000000000000000-mapping.dmp
-
memory/556-279-0x0000000000000000-mapping.dmp
-
memory/836-135-0x0000000000000000-mapping.dmp
-
memory/1188-147-0x0000000000000000-mapping.dmp
-
memory/1260-141-0x0000000000000000-mapping.dmp
-
memory/1324-132-0x0000000000000000-mapping.dmp
-
memory/1384-250-0x00000000004D0000-0x00000000004DE000-memory.dmpFilesize
56KB
-
memory/1384-239-0x0000000000718000-0x0000000000729000-memory.dmpFilesize
68KB
-
memory/1384-261-0x0000000000400000-0x0000000000454000-memory.dmpFilesize
336KB
-
memory/1384-288-0x0000000000718000-0x0000000000729000-memory.dmpFilesize
68KB
-
memory/1384-163-0x0000000000000000-mapping.dmp
-
memory/1424-136-0x0000000000000000-mapping.dmp
-
memory/1680-169-0x0000000000000000-mapping.dmp
-
memory/1680-313-0x0000000008530000-0x0000000008AD4000-memory.dmpFilesize
5.6MB
-
memory/1680-177-0x0000000000820000-0x0000000000864000-memory.dmpFilesize
272KB
-
memory/1680-316-0x0000000005A80000-0x0000000005AE6000-memory.dmpFilesize
408KB
-
memory/1712-143-0x0000000000000000-mapping.dmp
-
memory/1932-269-0x0000000000000000-mapping.dmp
-
memory/1948-155-0x0000000000000000-mapping.dmp
-
memory/2308-151-0x0000000000000000-mapping.dmp
-
memory/2604-134-0x0000000000000000-mapping.dmp
-
memory/2640-267-0x0000000000000000-mapping.dmp
-
memory/2856-146-0x0000000000000000-mapping.dmp
-
memory/3004-145-0x0000000000000000-mapping.dmp
-
memory/3044-289-0x0000000060900000-0x0000000060992000-memory.dmpFilesize
584KB
-
memory/3044-174-0x0000000000000000-mapping.dmp
-
memory/3316-138-0x0000000000000000-mapping.dmp
-
memory/3348-144-0x0000000000000000-mapping.dmp
-
memory/3352-315-0x00000000062E0000-0x0000000006356000-memory.dmpFilesize
472KB
-
memory/3352-319-0x0000000008DE0000-0x0000000008FA2000-memory.dmpFilesize
1.8MB
-
memory/3352-318-0x00000000069A0000-0x00000000069F0000-memory.dmpFilesize
320KB
-
memory/3352-194-0x0000000000BF0000-0x0000000000C34000-memory.dmpFilesize
272KB
-
memory/3352-178-0x0000000000000000-mapping.dmp
-
memory/3352-257-0x0000000005B20000-0x0000000006138000-memory.dmpFilesize
6.1MB
-
memory/3928-271-0x0000000000000000-mapping.dmp
-
memory/4224-152-0x0000000000000000-mapping.dmp
-
memory/4620-149-0x0000000000000000-mapping.dmp
-
memory/4952-133-0x0000000000000000-mapping.dmp
-
memory/4960-130-0x0000000000000000-mapping.dmp
-
memory/5000-131-0x0000000000000000-mapping.dmp
-
memory/5136-198-0x0000000000000000-mapping.dmp
-
memory/5148-264-0x0000000002330000-0x0000000002345000-memory.dmpFilesize
84KB
-
memory/5148-192-0x0000000000000000-mapping.dmp
-
memory/5148-265-0x0000000000400000-0x000000000058B000-memory.dmpFilesize
1.5MB
-
memory/5160-199-0x0000000000000000-mapping.dmp
-
memory/5192-213-0x0000000000000000-mapping.dmp
-
memory/5228-216-0x0000000000000000-mapping.dmp
-
memory/5236-205-0x0000000000000000-mapping.dmp
-
memory/5248-214-0x0000000000000000-mapping.dmp
-
memory/5256-215-0x0000000000000000-mapping.dmp
-
memory/5264-211-0x0000000000000000-mapping.dmp
-
memory/5288-212-0x0000000000000000-mapping.dmp
-
memory/5336-210-0x0000000000000000-mapping.dmp
-
memory/5412-273-0x0000000000000000-mapping.dmp
-
memory/5552-218-0x0000000000000000-mapping.dmp
-
memory/5564-219-0x0000000000000000-mapping.dmp
-
memory/5656-220-0x0000000000000000-mapping.dmp
-
memory/5668-221-0x0000000000000000-mapping.dmp
-
memory/5672-275-0x0000000000000000-mapping.dmp
-
memory/5680-222-0x0000000000000000-mapping.dmp
-
memory/5688-223-0x0000000000000000-mapping.dmp
-
memory/5704-224-0x0000000000000000-mapping.dmp
-
memory/5716-225-0x0000000000000000-mapping.dmp
-
memory/5728-226-0x0000000000000000-mapping.dmp
-
memory/5740-227-0x0000000000000000-mapping.dmp
-
memory/5912-238-0x0000000000000000-mapping.dmp
-
memory/5972-311-0x0000000000000000-mapping.dmp
-
memory/6012-242-0x0000000000000000-mapping.dmp
-
memory/6116-322-0x0000000073ED0000-0x0000000073F26000-memory.dmpFilesize
344KB
-
memory/6128-321-0x0000000073510000-0x0000000073597000-memory.dmpFilesize
540KB
-
memory/6184-310-0x0000000000000000-mapping.dmp
-
memory/6224-277-0x0000000000000000-mapping.dmp
-
memory/6568-256-0x0000000000000000-mapping.dmp
-
memory/6580-312-0x0000000000000000-mapping.dmp
-
memory/6780-260-0x0000000000000000-mapping.dmp
-
memory/7212-281-0x0000000000000000-mapping.dmp
-
memory/7584-283-0x0000000000000000-mapping.dmp
-
memory/7760-285-0x0000000000000000-mapping.dmp
-
memory/7776-287-0x0000000000000000-mapping.dmp
-
memory/7992-309-0x0000000000000000-mapping.dmp