Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe
Resource
win10v2004-20231023-en
General
-
Target
84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe
-
Size
957KB
-
MD5
cb53f66bae5614b3e99beb6a350d783a
-
SHA1
ca8f7a11755971ccbc140fe1ba6ecfa6071354ad
-
SHA256
84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c
-
SHA512
714a3172a50ba8556364d0b7ded6a52df5a4ea5e0d35f3c6b74287f55d6c1d6acf30a08743aee514ee9a68c17a56f692f8fd92078090b76edbfa3454f3dca127
-
SSDEEP
12288:IbcWOo2dAKlpItf+BV3XHSlHYBPHJqXbmxoRj3cQpRnRu9cdTjQ5p:1WR2dAK4tf+BVHHkIoRj3cQD
Malware Config
Extracted
smokeloader
2022
http://77.91.68.29/fks/
Extracted
redline
grome
77.91.124.86:19084
Extracted
redline
kinza
77.91.124.86:19084
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\4091.exe family_redline C:\Users\Admin\AppData\Local\Temp\4091.exe family_redline behavioral1/memory/1480-50-0x0000000000180000-0x00000000001BE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exe family_redline behavioral1/memory/6028-329-0x00000000005F0000-0x000000000062E000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Executes dropped EXE 9 IoCs
Processes:
3E6B.exe4013.exeyF1Ah1Zr.exe4091.exefs1CU1CH.exeKL5ML7va.exewV7DB3mG.exe1DZ80SI2.exe2Ig625SI.exepid process 5052 3E6B.exe 4352 4013.exe 4228 yF1Ah1Zr.exe 1480 4091.exe 4480 fs1CU1CH.exe 2484 KL5ML7va.exe 3372 wV7DB3mG.exe 3284 1DZ80SI2.exe 6028 2Ig625SI.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
KL5ML7va.exewV7DB3mG.exe3E6B.exeyF1Ah1Zr.exefs1CU1CH.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" KL5ML7va.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" wV7DB3mG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3E6B.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yF1Ah1Zr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" fs1CU1CH.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe1DZ80SI2.exedescription pid process target process PID 4808 set thread context of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 3284 set thread context of 4576 3284 1DZ80SI2.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1196 4808 WerFault.exe 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe 4012 3284 WerFault.exe 1DZ80SI2.exe 4300 4576 WerFault.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
AppLaunch.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI AppLaunch.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exepid process 3728 AppLaunch.exe 3728 AppLaunch.exe 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 3296 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
AppLaunch.exepid process 3728 AppLaunch.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 18 IoCs
Processes:
msedge.exepid process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
AUDIODG.EXEdescription pid process Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: SeShutdownPrivilege 3296 Token: SeCreatePagefilePrivilege 3296 Token: 33 6084 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 6084 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe3E6B.exeyF1Ah1Zr.exefs1CU1CH.exeKL5ML7va.exewV7DB3mG.execmd.exemsedge.exemsedge.exedescription pid process target process PID 4808 wrote to memory of 3460 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3460 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3460 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 2088 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 2088 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 2088 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 4808 wrote to memory of 3728 4808 84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe AppLaunch.exe PID 3296 wrote to memory of 5052 3296 3E6B.exe PID 3296 wrote to memory of 5052 3296 3E6B.exe PID 3296 wrote to memory of 5052 3296 3E6B.exe PID 3296 wrote to memory of 3688 3296 cmd.exe PID 3296 wrote to memory of 3688 3296 cmd.exe PID 5052 wrote to memory of 4228 5052 3E6B.exe yF1Ah1Zr.exe PID 5052 wrote to memory of 4228 5052 3E6B.exe yF1Ah1Zr.exe PID 5052 wrote to memory of 4228 5052 3E6B.exe yF1Ah1Zr.exe PID 3296 wrote to memory of 4352 3296 4013.exe PID 3296 wrote to memory of 4352 3296 4013.exe PID 3296 wrote to memory of 4352 3296 4013.exe PID 3296 wrote to memory of 1480 3296 4091.exe PID 3296 wrote to memory of 1480 3296 4091.exe PID 3296 wrote to memory of 1480 3296 4091.exe PID 4228 wrote to memory of 4480 4228 yF1Ah1Zr.exe fs1CU1CH.exe PID 4228 wrote to memory of 4480 4228 yF1Ah1Zr.exe fs1CU1CH.exe PID 4228 wrote to memory of 4480 4228 yF1Ah1Zr.exe fs1CU1CH.exe PID 4480 wrote to memory of 2484 4480 fs1CU1CH.exe KL5ML7va.exe PID 4480 wrote to memory of 2484 4480 fs1CU1CH.exe KL5ML7va.exe PID 4480 wrote to memory of 2484 4480 fs1CU1CH.exe KL5ML7va.exe PID 2484 wrote to memory of 3372 2484 KL5ML7va.exe wV7DB3mG.exe PID 2484 wrote to memory of 3372 2484 KL5ML7va.exe wV7DB3mG.exe PID 2484 wrote to memory of 3372 2484 KL5ML7va.exe wV7DB3mG.exe PID 3372 wrote to memory of 3284 3372 wV7DB3mG.exe 1DZ80SI2.exe PID 3372 wrote to memory of 3284 3372 wV7DB3mG.exe 1DZ80SI2.exe PID 3372 wrote to memory of 3284 3372 wV7DB3mG.exe 1DZ80SI2.exe PID 3688 wrote to memory of 4952 3688 cmd.exe msedge.exe PID 3688 wrote to memory of 4952 3688 cmd.exe msedge.exe PID 4952 wrote to memory of 4664 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 4664 4952 msedge.exe msedge.exe PID 3688 wrote to memory of 3268 3688 cmd.exe msedge.exe PID 3688 wrote to memory of 3268 3688 cmd.exe msedge.exe PID 3268 wrote to memory of 2360 3268 msedge.exe msedge.exe PID 3268 wrote to memory of 2360 3268 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe PID 4952 wrote to memory of 1892 4952 msedge.exe msedge.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe"C:\Users\Admin\AppData\Local\Temp\84f049870c425dcb50f3e85f5f0159abaa423783b0dbd5c8990244b1a6375d6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3460
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2088
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 3122⤵
- Program crash
PID:1196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4808 -ip 48081⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\3E6B.exeC:\Users\Admin\AppData\Local\Temp\3E6B.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF1Ah1Zr.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF1Ah1Zr.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fs1CU1CH.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fs1CU1CH.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KL5ML7va.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KL5ML7va.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wV7DB3mG.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wV7DB3mG.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DZ80SI2.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DZ80SI2.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 5408⤵
- Program crash
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 5727⤵
- Program crash
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exe6⤵
- Executes dropped EXE
PID:6028
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3F66.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/login2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:4664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:33⤵PID:2684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:83⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:23⤵PID:1892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:13⤵PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:13⤵PID:3096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2228 /prefetch:13⤵PID:4532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:13⤵PID:5172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:13⤵PID:5744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:13⤵PID:5844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:13⤵PID:4732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:13⤵PID:5968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6340 /prefetch:13⤵PID:5328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:13⤵PID:5732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:13⤵PID:1508
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7312 /prefetch:83⤵PID:684
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=8020 /prefetch:83⤵PID:1352
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:13⤵PID:5432
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7568 /prefetch:13⤵PID:776
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8484 /prefetch:13⤵PID:4928
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8468 /prefetch:13⤵PID:884
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8924 /prefetch:13⤵PID:5404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8760 /prefetch:13⤵PID:5300
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8780 /prefetch:83⤵PID:1280
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8780 /prefetch:83⤵PID:2376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7516 /prefetch:13⤵PID:1424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,1078325589254457692,10065753133774828857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=8716 /prefetch:23⤵PID:8104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/2⤵
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:2360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12752414763319591076,13898825514328229117,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:33⤵PID:1332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12752414763319591076,13898825514328229117,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:23⤵PID:2384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://store.steampowered.com/login/2⤵PID:880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:1328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://twitter.com/i/flow/login2⤵PID:5512
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:5584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/2⤵PID:6048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:6068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.epicgames.com/id/login2⤵PID:5548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:5648
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/signin2⤵PID:1148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:6080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/2⤵PID:504
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc6fe246f8,0x7ffc6fe24708,0x7ffc6fe247183⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\4013.exeC:\Users\Admin\AppData\Local\Temp\4013.exe1⤵
- Executes dropped EXE
PID:4352
-
C:\Users\Admin\AppData\Local\Temp\4091.exeC:\Users\Admin\AppData\Local\Temp\4091.exe1⤵
- Executes dropped EXE
PID:1480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3284 -ip 32841⤵PID:1220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4576 -ip 45761⤵PID:4500
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x33c 0x3381⤵
- Suspicious use of AdjustPrivilegeToken
PID:6084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD58992ae6e99b277eea6fb99c4f267fa3f
SHA13715825c48f594068638351242fac7fdd77c1eb7
SHA256525038333c02dff407d589fa407b493b7962543e205c587feceefbc870a08e3d
SHA512a1f44fff4ea76358c7f2a909520527ec0bbc3ddcb722c5d1f874e03a0c4ac42dac386a49ccf72807ef2fa6ccc534490ad90de2f699b1e49f06f79157f251ab25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD56276613a51dae3b747451bc05e24edfa
SHA196ff591013fc8d378a9b37ea580d8ec6e98bbde5
SHA256d17c0519716f5fa61ccf7289220c5e8917a36fbb29e48a86bb1122c9e3fcafb0
SHA512dc84cd5df4867849039ecea2c98b1aeb435399b9503b1384159b2d08fe180b9f3daadc98f55c6ab28faa1e66dea8abfa4e702232a7027d933b0eca91fcf6b5f3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000051Filesize
184KB
MD5990324ce59f0281c7b36fb9889e8887f
SHA135abc926cbea649385d104b1fd2963055454bf27
SHA25667bcedd3040fc55d968bbe21df05c02b731181541aff4ae72b9205300a4a3ecc
SHA51231e83da1ac217d25be6e7f35a041881b926f731fff69db6f144e4fe99b696a31f9ab7766ca22cf5a482743c2a2d00a699ca2c2d67837a86c471a2dd3bed9ea1f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
5KB
MD545d4449380c8716315e4123eebf3a763
SHA138c3d322a1ed74dc44f7fafaf8fb2b82cf3cd37e
SHA256cda7e7025fb47abd234e2f2f19dde9e4565fe393a64563508b3ae4b38d29280a
SHA5127bf6d9b317c65aa9f67c6a6e2658d5df19958b52721b48ce6db180d7294c1416a07e09f69a5b101e4648bad399b567220ebff63eba16856af202efbd0e1e021b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENTFilesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
4KB
MD5190c6ec4bec276edeb663a12fed0e230
SHA18a710b0468c95c5e7e7af8a60403af2e4a8e96fc
SHA256542d8347c33e74ccbf9fb93f763fb9bb7c1ce7b923d1fd62a0c227bf1557afc5
SHA512bc0f31872ea440dfc03dbeb73060d5d8a00ec7f99d21e436a3a7b0d46d36d127e1ccbee7497fda9f99926472153d5eab91d07fec2ca0a284d8850e24802eb425
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD58afb14b976299451dd92b426f8bcb58a
SHA118e15f5dae6eb2565f260ebb5fe019a088767281
SHA2563299932aa91b9b3cd64cdc425580b862caa75b64231489ff1ad2aedff4a81b94
SHA51296323b531b9f36cb46c482c1837d25168ae92f96d448a710ce5d9bff7e06fe84593331e46ecb2b0c9596931b7d3f3b871f6cfffd54621b7346206f544f9d582e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
8KB
MD54d15cc111d89a9971abc0bc48dd67e51
SHA1df7ba2fdd00b89234c6a9f54d5fe03a2d356b5df
SHA2567c3a6d65d9f72dfe78dd47fa6e31f7ee30d6df8f09c05f12f41f1e08f214c851
SHA512f9296b44f4f2b91281d2d13f8df8f087aa6d8359cf133839b54a06de01a239e68c263d93aa17f7a071760c3f7b1baedca151fd4cb30501233d33e0c7fdc274ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
7KB
MD5aeb6018dd27541bca32e0a5fcfea3ab4
SHA15a4f5adbfa9c18104eb994584724822677485fad
SHA256c7ace25eaba8b5c76abdb3f10d9565246734c976300358ac725cbba3bf4c70b1
SHA512a3cf90dbca7084bab3201a76bdfaaf345ad8e15d94cf615113b90837e00256a4fd77c01469b8dbf2425f3795fd631976cfc760311aa931aeb3d2e623635005f2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD58fe61881ca0069db4f61d792245259a7
SHA1ffc2147f9d43cfbb064b17f8d7b0050ea2e2b67d
SHA256269ff2ca56dc637ce30d92fd109cf85af94477f5695d872ca31007b361a7353f
SHA512961827d28c215bbc49f5ce20a1c549da83511b2f4333f445a7c48572dd8217953efd9b747d2d1966f21137de1ebebdeea16c8db5e23e95889daec3a92c49ef5d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
9KB
MD54d842c998444232c0832e75fdef1cda0
SHA13d15eff87f4867c10503c2c996fbe38d9c0c093a
SHA2566e25d78b6028797f5ab2eb9bdf2dca65467160e9743c28b783a3422be9e8ffc8
SHA5124b191ef8dbbde3dd6f0061a870e961b202e5134ef7a1ebaf5e89a07f79db2ac93d7b1584e5078f574423308f28058bd79e542fd0e5504784a65aa30197a0598a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5f1881400134252667af6731236741098
SHA16fbc4f34542d449afdb74c9cfd4a6d20e6cdc458
SHA256d6fcec1880d69aaa0229f515403c1a5ac82787f442c37f1c0c96c82ec6c15b75
SHA51218b9ac92c396a01b6662a4a8a21b995d456716b70144a136fced761fd0a84c99e8bd0afb9585625809b87332da75727b82a07b151560ea253a3b8c241b799450
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\8bddad13-7dbf-4f01-a30c-cf9293b5fbb8\indexFilesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\8bddad13-7dbf-4f01-a30c-cf9293b5fbb8\index-dir\the-real-indexFilesize
624B
MD50c485067f80b6788fe160185fd8492f6
SHA156372d28d4ab2ae0476855c4256bff0ef468fa7a
SHA256b0a7c162fc7e1ec2d54062d8abcb6fee55060c75c440e1f91bf65d4153fb9168
SHA5127d4383dc13529b760d44ecad065dc5b09440b6e6a2325a6ba0657f6afb5d3e815fdcc4cdafa07a195bb1766099a0645ea0f38a2655a88b45133211132e5e18ac
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\8bddad13-7dbf-4f01-a30c-cf9293b5fbb8\index-dir\the-real-index~RFe59673c.TMPFilesize
48B
MD5bea67e44ea8a54a8afd3e65c9af3719c
SHA1de30fb9c8372d66c5313749a2fefc79814759c39
SHA256c46602a8fa86d77c2ff3323b7fcce1d3b88dc1256fa160fa011f9183dcd5c987
SHA512fc7f748eb7d1c940387fa1a18273879246574565b7ed44ee7a9cbc536a290b4fb9fa8eaa6cd2ba8612c52fc4edcc7b3b6dbd40d1035f51b48d1ca77abacb42c9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d54e0787-6a16-426a-8662-9bcc400b7d9a\index-dir\the-real-indexFilesize
2KB
MD528ce1f6f97da91cea96ae6ce993127c0
SHA130d6103dc240e09347dfe0810a89bd5d488bfe8e
SHA256e8649ba5cd2511005e64d64b408b425aaee2ce377be88dde84c50936f4077046
SHA5129e7c17ea9df48b36645c5b243f9002019f84439ea56014e670b6cc7cc01d8b74b3640c92244613d68343b9a9415152563ce411f92965bc1a50916b0a96a6952c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\d54e0787-6a16-426a-8662-9bcc400b7d9a\index-dir\the-real-index~RFe593afc.TMPFilesize
48B
MD545410f6130e321216ed5fe7b5af1836a
SHA1ae0368c5c5bb081a062f7b71803eb9910a4f5489
SHA25646c373be284d0a7d5ca12c17cde3498a4d08affd6f179b953f7839c30dd9bee7
SHA5126035b9bbd0bca81ce4a60e24f82390f0effe28a8e8c092381ad31c723b01916e90384710355496bea025d253d363187bd2628b697b3cc1e7691c2e8f2f2f74f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
146B
MD518e1ee69688db749d8f05336a8db3dc2
SHA1e069bd13128bc0d0ed3d423f7a0b5bbc37ed396b
SHA2560a84d84209998fd3673bd761531ff858fd70310b272d3c742c0c67e1418875f1
SHA512bb9f0eebb53114869ac15b682c78046fa8e11946654a91b94f6a0b199ea5e0b1cf1fe76eb32ca6a089db3d14426a69ac742debd0a7d70c26596520fb8b99a25f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
146B
MD52df6ef0cfa42871584224e8899f12256
SHA1e5b5fd681a2d65b68cc63a604907018553e3cbbd
SHA256183363749b9c695d3d22c91192371ac896815ac393d4708cf215073687c92e6b
SHA5129a3e5971be0ed7b04670f942b4e57e993aee5ba7414d8fd29cb45ba8b085628a519a363762a48588b27acb0191075e54d4f566777a302df80835709012732f6b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
157B
MD562edfb6040f887a78ea3b53fb59f753f
SHA120d956c20bdafa175d5d745ebc00b8c618330571
SHA2567de52a5bb390f433346484e57fe0cf524c3972842e7baa843163585876c69e4e
SHA512184244aed7a291b63afcf3dbab1cd94a24f3abc76b7b62966788c40af0c7e544cf15cf625ee7f27cdf7db22d040a17b3bf747163957c8c05ba698ec8430fa2e5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txtFilesize
82B
MD5c32a69bf8b87d99baca27c8656567015
SHA1b50a3e35f2e7cf4b578a243b9e359e4bb35dad45
SHA256c9418dd087a4b72b46eab86b0a5206fb1edf4005ac05e830f86d75781e3ff176
SHA512793ded2fe4f49c4e9c7da9351fdaaa0c2b51f84db263813b0fb1cc7df679deacf797e199d66cdbd0f9c78782fc29328f6fedb45dd21ed6afeb9df3d838388c0c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt.tmpFilesize
153B
MD58d181f3d81f69bca8226b4226cf8fd95
SHA1e75f6b0ff200308ff750e5abded629b4a514ce4d
SHA256bc1b2400ad8bd674f02138f0ad73e438a07be0494a92a265fcb71fb3b24858d8
SHA512cb1971bc347e935bf1fc88d3b197964cc9dd3bbb6ff41ee9bd21ab4b8a381d7e49eccbbb3d7fbf604bc7306f71605da68568f3a9bb02f85022fbfd1072e4ee18
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe58a64d.TMPFilesize
89B
MD5f09af2ab93d91c54e1e130dcea6e8386
SHA1ac699a93413e26c4681aa8be332744fd866a8992
SHA256dbcf30a8ff474fb2b4ee8fc5e7f33b24d781b46b81d9138dd27a477f83ccfaa2
SHA5127157ee25bcf674be0884374abb471e0057bee140118bad69e6218c52c7fd0baae419fd550e0eaaf903d85db5f8d68409b69394d94eebf0abf9ad6eb05d4bc015
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\8f7abdeb3486c1b8780fede76afc20e044eff1b5\ff610145-6b97-491e-8e93-f90f0bab79b5\index-dir\the-real-indexFilesize
72B
MD53e0f0862909ea3ec73b042d3955ea5fe
SHA1d80c642d16ac486c2335cdcde0a74297af907ac5
SHA25638e0d5f95eb55ebca0b5dbd82ac329ae2939006d154e28bc7f96c24995404947
SHA5121d5e52be3453ebb614d3f3fc5a9cb492c1fa17913746eeccc871274510ef973b0efab5ce3a290ad4eca8ad911a08daa28ba241edfce5d5a835bd7b0c08691941
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\8f7abdeb3486c1b8780fede76afc20e044eff1b5\ff610145-6b97-491e-8e93-f90f0bab79b5\index-dir\the-real-index~RFe59c857.TMPFilesize
48B
MD52b1f6c4486dc2cff0407613fbf0d3e0e
SHA1c0571e8c77eafa7e14662ad4cb30e5cf4f0ec2a2
SHA25679b8db1e7737ddcba89875cfc0e28802e0848c4fd72901043c6bfd97d875e864
SHA5121866e8b11a86c39f352cd54c60324c736618f81988b9b5e0782a480eb68bf6ebf6a341788c5f240a847312b16e96d80e50fee8c85b3fe5102bfd3fcca8a811a2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\8f7abdeb3486c1b8780fede76afc20e044eff1b5\index.txtFilesize
147B
MD5145d9f2439f0e1115f38614ba4b52084
SHA1e3f8abc72638b2d60190f13709d27ecb0f289522
SHA256167dbb7eb5f65f54f9a40cb34c0a7892ccff630650408144b2f2d294df58ffe4
SHA5127d086866def4b61747bfeec3216901f7c917a6fce9033b8eac8f1bd66af11f33e44a1f03a3fafa30ebeb4b904e79d9ae33d234945ed6aae07a861c22ac503531
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\8f7abdeb3486c1b8780fede76afc20e044eff1b5\index.txt~RFe596cba.TMPFilesize
83B
MD5956c04907cc5ae2287140f306671dda7
SHA1d841a18d68ddab719523ea8de1fbf0d574b3368a
SHA256e195ce86b883afaf8c55eba14727d489c04b99a6278919b17f0272218437f2f8
SHA512420bd460ad56717faff7f15232a1ad80ef6aa3ef2a51c6a688703329a849804e59d6476e88cd1baa38dd72671a7298315392c0d7a4a166374cfceb35bfad22dc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
96B
MD59cecd89c5ee377c948ef530becf429d4
SHA1b3bf4ba0b04d253e61de90219867b88abb414d35
SHA2569fce6a281546806a4353e5ce08893eadabeedd152ea91b06bb84ef49671e3a33
SHA5128141ae9f485fffd79697fe749a0ccc8a8e005e4c11c08f675ffd8540d1c845477a5c0a38a2a4e47d8729d05cad6b7d1ae29c772fb70e0534a4cfa0e5c1235e28
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-indexFilesize
144B
MD587da9fd37d8a7bbbea2040778ff7a593
SHA15f768c6f6c97af61ae6426888efa61595a89349f
SHA256f318c98b70933ca1f0d27c77ac52c876a72fe35324bb8095121d010860cda80e
SHA5129f93e5cb507e0757c3478d5969e46ccd20d32c9981bbdbe25292a99f757151b3326a45d0ec84196ee827ed97d4503ce021bf3c193f4875af9b605a3fdaca45bc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58fc5c.TMPFilesize
48B
MD513537d106ee4f3bddea549d40e0541ee
SHA1bbd89c2dcb969921b495e89c98f48cc17586115e
SHA256ed38d36197273d0fc4b458ea7209905fb65d34611bb321f6c747c103c4e031ca
SHA51217b63cd7e66c5179205a98c0060385218a559623e18439a9977d9100f20e1d5312aecab654b8432b2225331316aa514a23bf44287de41cd1eee9a4e5fa0759e8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD578124a06f1256e6d862553c29630b2f1
SHA109eedce662f1d01867046fb2637880dabd5e072f
SHA256756eda8a718aee70a88d935cef227fe0b06e0c9c5c8825aee8e12ee93339cd54
SHA512d0ead23bfcefa63c495227f78abe5984118958ff8fff35ffab58d518bad6faedeef83c21540f924697043623111e79eac2d9a8fe0989474543f9e3716727011e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD5ff07f055157a904376f3b547ade93439
SHA131fc95763d05fa4bf3c6e53031130a0bfcc0dcee
SHA2568e0e1d860b4b226c34f53186bf3b32dcb547b59eb36cc4c719c9d961ed2bbc13
SHA512a5d1d05a2f6d972246cb4c1db28d1a79c3870735d90d938da7c714188b2fd579027a4bcbb34444c06aabe554c9f2a6873d4d6e1ea2a46a21a2bf989f5a7ed8d0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD564b28736213a608ffb877fcdcb92db21
SHA147045dd8c1ad734c1d41eb4419ac3ae860ba9f77
SHA256bbb9f5b9ed75dacbf63b85bc8ab6edee056d34a0a74bd0a06d6864080f6c7d62
SHA51205f1543762fefe60025f76ed45aba60737a7903bc9c6ee40c7ebea58d4c99d503b87d306f774f8ca1e232b246c1024f8316a2805d99e3906b5ca1620659fbf6c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD59424dbbb89ac582cd65f50dd6975477f
SHA18c1b2cef53d26c04db364c27ea254c96c785e4a4
SHA2568d1f8d55563792e49cbc1f503ff5f04f3390a836614c69fe33721f68b6408b0d
SHA5128c0af3f2ed3d6aed4deafb0f26daff43eb0ac1e58d9ca636fb356d0987b5aacab3fcb8ac49fe312bc5272142cea71fb66c3815add79e3d09de75666c8379b71d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
3KB
MD52337016717820a0d61221504c3e3c0f8
SHA18cf93edbde7fb2cfe854c5f2f052fcdb44a8d282
SHA256def0d13cbf1bd5b707dcf6803178517bdc8b68a107e7bff6c1ab6311bba18bdb
SHA5120373ee1b277b83c01ae411fcb7f3a038d7488a4775d2fc9cec6c7666e77770c67c887cee131250f335e07f8d2564826a82e7674c4b0151ed8c6e6e32fc559387
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
4KB
MD519c0a5a407e90e698d093d705449e24d
SHA101ef97e6cf563c8cd31f33707848985ade6ed152
SHA256e635ff12c88688f6979f839543bb630b0a64930060647b51d6a18e9924f6da1f
SHA512af7d5e733e2cec739109ed022c3b73674c32c973cd03371efb5601855c365a67f6e10b26c1d9862b13e943b80d5c6f09297030674436680d8e789d70496fe05a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
4KB
MD53c349f5882da2d63ad7481aeeb0108d1
SHA1ec3631bd243f8ea0e0316fec9e1165c8f4799da9
SHA256c6f27d01c788edd0c8ba17d3c3e141fcb6b02da1347c82c1e8d874269b770b84
SHA51202fe1e21d2717d216e5f1d5e76db7d6af8ff423e7bd7a841732b07a0a2b57cdf82eafd3bd7984839186ce71d107ab1030b3485c7425607aef5700fd64dac3475
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
4KB
MD52c6a853b674988612e3cb47c08811314
SHA128f46199f824ac3cbce2ca0c92d32b31bfbc9392
SHA25622108e19ba7f345ab6a7739c963a2f3455f34eb36c4dab19bae209fe60c9aa81
SHA51239875742b8352e824d4c22203cb0bf9ee268c60e7f9095da643ec82f1240005a605a883fe66af93e303ccf53dc6151c6bf56e252d55abcf1c5115c599dbffb32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
2KB
MD5963e6e742fdd57e15178f834ab649d85
SHA139522467f3ad2c137145287a77482222cc5df5f4
SHA25620472cde0c07f512cd4a3be20900287b6bbd125a4642974fce662afb495bed37
SHA5125ed83d17c70507203f74a548dea03f62c1a8549b2acfafe803b7765a30a58a92268e73779c2c093adc8c31107e80711db43ef1e6c8d9eb82bb8f621765ed7106
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurityFilesize
4KB
MD5712b5cd48ef863e0ec3632708084d2aa
SHA151bad4cfd5cec9f7b9266e61f2937700842573b2
SHA256001b75f0d51309da9ae12299c70b4816185c24e30f249e838982bb411cebe631
SHA5127d7a4c1632cf45ecbb1504c4d2ee1841be2f13bacfdc097d348bb2adde1c45b2a490912a946d5fee123b48035bf8cc2a44251bfa207c29700ad47f664da06027
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58c56e.TMPFilesize
1KB
MD5d618f7e641ff23c3586b843f8dfe9580
SHA10be925965c2b962ce2ff67accf7f83cd3c632007
SHA256b85202157effc72f07fef2cfc2b0472fafe6de1791d5398ff58a1fbb8b604a38
SHA51203d711d194d58864ed0c3d763d3f7dc6933921e68d24b05de77ff178a8fb7583f5cb63c91cb338f1ff56ad125fdd495b20a1b8d522fd720591fe6928f93decf8
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD53dc4b4a2e4d88b52ba91cc2b9d809056
SHA1e333ec3bf3e2a2060dfd8f14bc691df96bc2a912
SHA256022c79f7abcbdb2176d109f1b87bc65ace5df6304862d1dfa63110eda829e927
SHA5124741ec506d0269e82761d5d9efee4f3fe6ce67f1596808ae8e4c2fa8290281db9cbc92a9d2a84035cd8496ff94f75e90ce1b9601d1693d498c1ffb8901a34e54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
2KB
MD53dc4b4a2e4d88b52ba91cc2b9d809056
SHA1e333ec3bf3e2a2060dfd8f14bc691df96bc2a912
SHA256022c79f7abcbdb2176d109f1b87bc65ace5df6304862d1dfa63110eda829e927
SHA5124741ec506d0269e82761d5d9efee4f3fe6ce67f1596808ae8e4c2fa8290281db9cbc92a9d2a84035cd8496ff94f75e90ce1b9601d1693d498c1ffb8901a34e54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD5fa8ff3d30d5c706e79eeb5a801c641a2
SHA1c9743f164b8b54b42788911315d9c9c54c75ef4c
SHA2561e625fc6026970f248029e808e7703e4d2917d0405b041bcfe627aa0333de2d4
SHA51217cf44b24479e6b6a32c9c9b2428ea3eed8cb072c6250d1d67ce92af35dea9dfd7411dac2a297937968dcca8fd5ccb57a51f492a34501e908138395a5e67fc96
-
C:\Users\Admin\AppData\Local\Temp\3E6B.exeFilesize
1.5MB
MD597ad342cad616deb8449ea7dec2c41b8
SHA1e42cb822fb6c89ac679e44e7f6feeff3a4eec0a8
SHA256e26d800c18d2b06e0800a16c5f10c150333af1d8e124f2f52299f1d92c953a90
SHA512715c5d33f2e661bcb0cd700a06707e6d7e05f6f65c8d26e0f0de8a44d339d0012e25b8da108eaf50002fcb6534147883374c66702fd9bf39f9debc2386b1085a
-
C:\Users\Admin\AppData\Local\Temp\3E6B.exeFilesize
1.5MB
MD597ad342cad616deb8449ea7dec2c41b8
SHA1e42cb822fb6c89ac679e44e7f6feeff3a4eec0a8
SHA256e26d800c18d2b06e0800a16c5f10c150333af1d8e124f2f52299f1d92c953a90
SHA512715c5d33f2e661bcb0cd700a06707e6d7e05f6f65c8d26e0f0de8a44d339d0012e25b8da108eaf50002fcb6534147883374c66702fd9bf39f9debc2386b1085a
-
C:\Users\Admin\AppData\Local\Temp\3F66.batFilesize
342B
MD5e79bae3b03e1bff746f952a0366e73ba
SHA15f547786c869ce7abc049869182283fa09f38b1d
SHA256900e53f17f7c9a2753107b69c30869343612c1be7281115f3f78d17404af5f63
SHA512c67a9a5a366be8383ad5b746c54697c71dbda712397029bc8346b7c52dd71a7d41be3d35159de35c44a3b8755d9ce94acda08d12ff105263559adb6a6d0baf50
-
C:\Users\Admin\AppData\Local\Temp\4013.exeFilesize
180KB
MD5286aba392f51f92a8ed50499f25a03df
SHA1ee11fb0150309ec2923ce3ab2faa4e118c960d46
SHA256ecf04cf957e7653f20ef2d0d73b63040620a6e36a53605ab2242cbef40f7fb22
SHA51284e1535026a4fce44bb662a21221ca295a9f894b0bd2a03e1e5720f6c9734d849f7fe5f997c14badc520ddd0b5bd507f49556a432b6ccd8e4c73d34a0a17421c
-
C:\Users\Admin\AppData\Local\Temp\4013.exeFilesize
180KB
MD5286aba392f51f92a8ed50499f25a03df
SHA1ee11fb0150309ec2923ce3ab2faa4e118c960d46
SHA256ecf04cf957e7653f20ef2d0d73b63040620a6e36a53605ab2242cbef40f7fb22
SHA51284e1535026a4fce44bb662a21221ca295a9f894b0bd2a03e1e5720f6c9734d849f7fe5f997c14badc520ddd0b5bd507f49556a432b6ccd8e4c73d34a0a17421c
-
C:\Users\Admin\AppData\Local\Temp\4091.exeFilesize
221KB
MD573089952a99d24a37d9219c4e30decde
SHA18dfa37723afc72f1728ec83f676ffeac9102f8bd
SHA2569aa54a5b73fe93d789ec1707ebd41ff824fcf6ba34b18d97ebc566cee8cbce60
SHA5127088b995c0f6425ad4460b1f286d36e5b7ca3d79308febfac7f212e630b00569239e0b22455198739d20b1fbae1b70c24c22f41a34bab19a793aaa31164aa2d2
-
C:\Users\Admin\AppData\Local\Temp\4091.exeFilesize
221KB
MD573089952a99d24a37d9219c4e30decde
SHA18dfa37723afc72f1728ec83f676ffeac9102f8bd
SHA2569aa54a5b73fe93d789ec1707ebd41ff824fcf6ba34b18d97ebc566cee8cbce60
SHA5127088b995c0f6425ad4460b1f286d36e5b7ca3d79308febfac7f212e630b00569239e0b22455198739d20b1fbae1b70c24c22f41a34bab19a793aaa31164aa2d2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF1Ah1Zr.exeFilesize
1.3MB
MD5ea8e96533ed3e3c5b69c078fdeae215d
SHA1938e79d0cb2397347c6fbacd79f12c5eb2fc2a6f
SHA256d069481e0a0c831c819ab3fff620b6d455914703862e232e90a517d10d029207
SHA512c44fb7f5b39e7c72c6249b269403de201c1f968b7b37dc5cabb05fc523b1932f78b060e8179ce399c1ebe2b5b9ca0f40cdb7907abdbc5f5ae816db69c8e0bffa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yF1Ah1Zr.exeFilesize
1.3MB
MD5ea8e96533ed3e3c5b69c078fdeae215d
SHA1938e79d0cb2397347c6fbacd79f12c5eb2fc2a6f
SHA256d069481e0a0c831c819ab3fff620b6d455914703862e232e90a517d10d029207
SHA512c44fb7f5b39e7c72c6249b269403de201c1f968b7b37dc5cabb05fc523b1932f78b060e8179ce399c1ebe2b5b9ca0f40cdb7907abdbc5f5ae816db69c8e0bffa
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fs1CU1CH.exeFilesize
1.2MB
MD5c2300638b343e858e714027ac54e1e77
SHA1a9fad42d3f0711acc9f49a1585b9c10fa1c48ae7
SHA256451e1efe5a1ea0efea346211e599dba15e2347955d053d9cb93daacf95ae93e8
SHA5129fde84fb42dc1b259540bb9ee18d20f30dd5105a27623ec90d936b2353343db35c57778b2dfbbb077c69afe4fee3e8f850c4dc59d21e56b76753ac3d7c4ee969
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\fs1CU1CH.exeFilesize
1.2MB
MD5c2300638b343e858e714027ac54e1e77
SHA1a9fad42d3f0711acc9f49a1585b9c10fa1c48ae7
SHA256451e1efe5a1ea0efea346211e599dba15e2347955d053d9cb93daacf95ae93e8
SHA5129fde84fb42dc1b259540bb9ee18d20f30dd5105a27623ec90d936b2353343db35c57778b2dfbbb077c69afe4fee3e8f850c4dc59d21e56b76753ac3d7c4ee969
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KL5ML7va.exeFilesize
768KB
MD5afbbcbc4c7d4bfa020cd2e6a43cbe10f
SHA10423badcfb5f1f988c0db2a99be6ef9b9cc8058a
SHA25615d421f11afda23487478fe2385ff7a059122b5e37a937a152a4639d57bd8f5d
SHA512499a0940df42efbab75f2f960220e1e13128525095708ef34c30a719c72c992bb9771e0e23ae413e7b3cf4fd02e3d09ffcec90993360fce8afee027dd2737493
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\KL5ML7va.exeFilesize
768KB
MD5afbbcbc4c7d4bfa020cd2e6a43cbe10f
SHA10423badcfb5f1f988c0db2a99be6ef9b9cc8058a
SHA25615d421f11afda23487478fe2385ff7a059122b5e37a937a152a4639d57bd8f5d
SHA512499a0940df42efbab75f2f960220e1e13128525095708ef34c30a719c72c992bb9771e0e23ae413e7b3cf4fd02e3d09ffcec90993360fce8afee027dd2737493
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wV7DB3mG.exeFilesize
573KB
MD5681e5dfd6c0d81aa2d0afe7648982fe5
SHA1bc5a73a7d9c8778d2b71041e9e8c6a3006b28bfc
SHA25609f01074fa70b60d2725cf8e4d21d187543d57ec7740961dad61821347052d20
SHA512c416db39242844a2c7e0653b6c989a7ae5e29c028a0e9567397c787a903b96c06da72c7da22504cd2a5af59e800de65dd938bba2d96a46b07dede32fc81ce46c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\wV7DB3mG.exeFilesize
573KB
MD5681e5dfd6c0d81aa2d0afe7648982fe5
SHA1bc5a73a7d9c8778d2b71041e9e8c6a3006b28bfc
SHA25609f01074fa70b60d2725cf8e4d21d187543d57ec7740961dad61821347052d20
SHA512c416db39242844a2c7e0653b6c989a7ae5e29c028a0e9567397c787a903b96c06da72c7da22504cd2a5af59e800de65dd938bba2d96a46b07dede32fc81ce46c
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DZ80SI2.exeFilesize
1.1MB
MD5b5e9684accaa6c4b8bfd4c4c7b568f69
SHA1049c0730f58e2c151cf79933181ba9d6e067eb03
SHA25644ebad74d9aedd8f2e5594ae160c5b7671e594fff18d533a78fba6fba34add3d
SHA512c3740baf4705a6bcf20a7e62593f3b4392443bf9c80b1d2ab8993e41023229e4e01ad9bc75121af6a71a1aac95b548d0d8f229e1d029ba295f84b2b09e73d2d7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1DZ80SI2.exeFilesize
1.1MB
MD5b5e9684accaa6c4b8bfd4c4c7b568f69
SHA1049c0730f58e2c151cf79933181ba9d6e067eb03
SHA25644ebad74d9aedd8f2e5594ae160c5b7671e594fff18d533a78fba6fba34add3d
SHA512c3740baf4705a6bcf20a7e62593f3b4392443bf9c80b1d2ab8993e41023229e4e01ad9bc75121af6a71a1aac95b548d0d8f229e1d029ba295f84b2b09e73d2d7
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exeFilesize
223KB
MD536ed62f08c347d07eb79de23a94d51f7
SHA18b3fb5989f5052bce101a4daf26bd85ca8346715
SHA2566dc2d2213819e709b400bf52df345362b9bb859ab28cfbc2fb4c16e10e3d093d
SHA512344fd1d06502e0a9aa38e0404b92ae12c76c73c9c40f1e3bf1b6de9dbd24663cd0e4228116169ab0df1697afb076777c5180d2df326271dfa0159924bfc9f5bb
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\2Ig625SI.exeFilesize
223KB
MD536ed62f08c347d07eb79de23a94d51f7
SHA18b3fb5989f5052bce101a4daf26bd85ca8346715
SHA2566dc2d2213819e709b400bf52df345362b9bb859ab28cfbc2fb4c16e10e3d093d
SHA512344fd1d06502e0a9aa38e0404b92ae12c76c73c9c40f1e3bf1b6de9dbd24663cd0e4228116169ab0df1697afb076777c5180d2df326271dfa0159924bfc9f5bb
-
\??\pipe\LOCAL\crashpad_3268_SSMWUIXDGDUMHQNXMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\??\pipe\LOCAL\crashpad_4952_QQBWHFAGUHPKYWSTMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1480-64-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1480-63-0x0000000006F30000-0x0000000006FC2000-memory.dmpFilesize
584KB
-
memory/1480-50-0x0000000000180000-0x00000000001BE000-memory.dmpFilesize
248KB
-
memory/1480-54-0x00000000736C0000-0x0000000073E70000-memory.dmpFilesize
7.7MB
-
memory/1480-62-0x00000000074E0000-0x0000000007A84000-memory.dmpFilesize
5.6MB
-
memory/1480-65-0x0000000004A90000-0x0000000004A9A000-memory.dmpFilesize
40KB
-
memory/1480-74-0x00000000080B0000-0x00000000086C8000-memory.dmpFilesize
6.1MB
-
memory/1480-75-0x00000000072C0000-0x00000000073CA000-memory.dmpFilesize
1.0MB
-
memory/1480-76-0x0000000007180000-0x0000000007192000-memory.dmpFilesize
72KB
-
memory/1480-82-0x00000000071F0000-0x000000000722C000-memory.dmpFilesize
240KB
-
memory/1480-226-0x00000000071A0000-0x00000000071B0000-memory.dmpFilesize
64KB
-
memory/1480-203-0x00000000736C0000-0x0000000073E70000-memory.dmpFilesize
7.7MB
-
memory/1480-83-0x0000000007230000-0x000000000727C000-memory.dmpFilesize
304KB
-
memory/3296-2-0x00000000031B0000-0x00000000031C6000-memory.dmpFilesize
88KB
-
memory/3728-3-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3728-1-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3728-0-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/4576-277-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4576-278-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4576-280-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/4576-271-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/6028-451-0x00000000076C0000-0x00000000076D0000-memory.dmpFilesize
64KB
-
memory/6028-449-0x00000000736C0000-0x0000000073E70000-memory.dmpFilesize
7.7MB
-
memory/6028-344-0x00000000076C0000-0x00000000076D0000-memory.dmpFilesize
64KB
-
memory/6028-330-0x00000000736C0000-0x0000000073E70000-memory.dmpFilesize
7.7MB
-
memory/6028-329-0x00000000005F0000-0x000000000062E000-memory.dmpFilesize
248KB