Analysis

  • max time kernel
    1087s
  • max time network
    1091s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-08-2024 04:07

Errors

Reason
Machine shutdown

General

  • Target

    $PLUGINSDIR/System.dll

  • Size

    11KB

  • MD5

    00a0194c20ee912257df53bfe258ee4a

  • SHA1

    d7b4e319bc5119024690dc8230b9cc919b1b86b2

  • SHA256

    dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3

  • SHA512

    3b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667

  • SSDEEP

    192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Extracted

Family

modiloader

C2

https://drive.google.com/u/0/uc?id=1TcSctGVBajYMA7CFDc158wpvqkpxmkhJ&export=download

Extracted

Family

remcos

Version

1.7 Pro

Botnet

Host

C2

nickman12-46565.portmap.io:46565

nickman12-46565.portmap.io:1735

Attributes
  • audio_folder

    audio

  • audio_path

    %AppData%

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    5

  • copy_file

    Userdata.exe

  • copy_folder

    Userdata

  • delete_file

    true

  • hide_file

    true

  • hide_keylog_file

    true

  • install_flag

    true

  • install_path

    %WinDir%\System32

  • keylog_crypt

    true

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • keylog_path

    %WinDir%\System32

  • mouse_option

    false

  • mutex

    remcos_vcexssuhap

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screens

  • screenshot_path

    %AppData%

  • screenshot_time

    1

  • startup_value

    remcos

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 2 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs 3 IoCs
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • ModiLoader First Stage 1 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Warzone RAT payload 2 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 20 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Interacts with shadow copies 3 TTPs 3 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:5388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5388 -s 460
        3⤵
        • Program crash
        PID:3948
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5388 -ip 5388
    1⤵
      PID:1472
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda48f3cb8,0x7ffda48f3cc8,0x7ffda48f3cd8
        2⤵
          PID:5240
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1904 /prefetch:2
          2⤵
            PID:5372
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:5560
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:8
            2⤵
              PID:420
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:1
              2⤵
                PID:1460
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:1
                2⤵
                  PID:4996
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:1
                  2⤵
                    PID:3196
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:1
                    2⤵
                      PID:5728
                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4752 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5776
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4556
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1
                      2⤵
                        PID:5084
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5436 /prefetch:1
                        2⤵
                          PID:5136
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5172 /prefetch:8
                          2⤵
                            PID:1008
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5292 /prefetch:8
                            2⤵
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5460
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                            2⤵
                              PID:3616
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:1
                              2⤵
                                PID:4788
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:1
                                2⤵
                                  PID:780
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:1
                                  2⤵
                                    PID:1260
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:1
                                    2⤵
                                      PID:5576
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:1
                                      2⤵
                                        PID:2580
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:1
                                        2⤵
                                          PID:5520
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:1
                                          2⤵
                                            PID:5596
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                                            2⤵
                                              PID:5568
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:1
                                              2⤵
                                                PID:6060
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:1
                                                2⤵
                                                  PID:6072
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1724 /prefetch:1
                                                  2⤵
                                                    PID:4516
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6520 /prefetch:1
                                                    2⤵
                                                      PID:2344
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:1
                                                      2⤵
                                                        PID:2876
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6944 /prefetch:1
                                                        2⤵
                                                          PID:4104
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6884 /prefetch:1
                                                          2⤵
                                                            PID:5472
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1332 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2844
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3028 /prefetch:8
                                                            2⤵
                                                              PID:5008
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                                                              2⤵
                                                                PID:5528
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1884,619659753807040474,3578147420492193002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2748 /prefetch:1
                                                                2⤵
                                                                  PID:1480
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:3796
                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                  1⤵
                                                                    PID:3200
                                                                  • C:\Windows\System32\rundll32.exe
                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                    1⤵
                                                                      PID:3616
                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Virus\WinNuke.98.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Virus\WinNuke.98.exe"
                                                                      1⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:736
                                                                    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Virus\Melissa.doc" /o ""
                                                                      1⤵
                                                                      • Checks processor information in registry
                                                                      • Enumerates system info in registry
                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2892
                                                                    • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"
                                                                      1⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2260
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 256
                                                                        2⤵
                                                                        • Program crash
                                                                        PID:1364
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2260 -ip 2260
                                                                      1⤵
                                                                        PID:5916
                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\WarzoneRAT.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\WarzoneRAT.exe"
                                                                        1⤵
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        • NTFS ADS
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:656
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp565F.tmp"
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:860
                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                          2⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4892
                                                                      • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NetWire.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NetWire.exe"
                                                                        1⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1268
                                                                        • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NetWire.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NetWire.exe"
                                                                          2⤵
                                                                          • Adds Run key to start application
                                                                          • Suspicious use of SetThreadContext
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3300
                                                                          • C:\Program Files (x86)\internet explorer\ieinstal.exe
                                                                            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
                                                                            3⤵
                                                                              PID:1808
                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004E0 0x00000000000004CC
                                                                          1⤵
                                                                            PID:820
                                                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NJRat.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NJRat.exe"
                                                                            1⤵
                                                                            • Drops startup file
                                                                            • Adds Run key to start application
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3436
                                                                            • C:\Windows\SysWOW64\netsh.exe
                                                                              netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\NJRat.exe" "NJRat.exe" ENABLE
                                                                              2⤵
                                                                              • Modifies Windows Firewall
                                                                              • Event Triggered Execution: Netsh Helper DLL
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4948
                                                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\Remcos.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\RAT\Remcos.exe"
                                                                            1⤵
                                                                            • Adds Run key to start application
                                                                            • Drops file in System32 directory
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3428
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3748
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                3⤵
                                                                                • UAC bypass
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Modifies registry key
                                                                                PID:4436
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\install.bat" "
                                                                              2⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:6080
                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                PING 127.0.0.1 -n 2
                                                                                3⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:5944
                                                                              • C:\Windows\SysWOW64\Userdata\Userdata.exe
                                                                                "C:\Windows\SysWOW64\Userdata\Userdata.exe"
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:956
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1036
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                    5⤵
                                                                                    • UAC bypass
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry key
                                                                                    PID:5368
                                                                                • C:\Program Files (x86)\Internet Explorer\iexplore.exe
                                                                                  "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
                                                                                  4⤵
                                                                                    PID:1600
                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\Annabelle.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\Annabelle.exe"
                                                                              1⤵
                                                                              • Modifies WinLogon for persistence
                                                                              • Modifies Windows Defender Real-time Protection settings
                                                                              • UAC bypass
                                                                              • Disables RegEdit via registry modification
                                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                                              • Impair Defenses: Safe Mode Boot
                                                                              • Adds Run key to start application
                                                                              PID:1868
                                                                              • C:\Windows\system32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:2356
                                                                              • C:\Windows\system32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:4636
                                                                              • C:\Windows\system32\vssadmin.exe
                                                                                vssadmin delete shadows /all /quiet
                                                                                2⤵
                                                                                • Interacts with shadow copies
                                                                                PID:920
                                                                              • C:\Windows\system32\NetSh.exe
                                                                                NetSh Advfirewall set allprofiles state off
                                                                                2⤵
                                                                                • Modifies Windows Firewall
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                PID:2156
                                                                              • C:\Windows\System32\shutdown.exe
                                                                                "C:\Windows\System32\shutdown.exe" -r -t 00 -f
                                                                                2⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5104
                                                                            • C:\Windows\system32\vssvc.exe
                                                                              C:\Windows\system32\vssvc.exe
                                                                              1⤵
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2936
                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCry.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\WannaCry.exe"
                                                                              1⤵
                                                                              • Drops startup file
                                                                              • Adds Run key to start application
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5516
                                                                              • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!WannaDecryptor!.exe
                                                                                !WannaDecryptor!.exe f
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1600
                                                                            • C:\Windows\system32\LogonUI.exe
                                                                              "LogonUI.exe" /flags:0x4 /state0:0xa39d9855 /state1:0x41c64e6d
                                                                              1⤵
                                                                              • Modifies data under HKEY_USERS
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4388

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              d30a5618854b9da7bcfc03aeb0a594c4

                                                                              SHA1

                                                                              7f37105d7e5b1ecb270726915956c2271116eab7

                                                                              SHA256

                                                                              3494c446aa3cb038f1d920b26910b7fe1f4286db78cb3f203ad02cb93889c1a8

                                                                              SHA512

                                                                              efd488fcd1729017a596ddd2950bff07d5a11140cba56ff8e0c62ef62827b35c22857bc4f5f5ea11ccc2e1394c0b3ee8651df62a25e66710f320e7a2cf4d1a77

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              03a56f81ee69dd9727832df26709a1c9

                                                                              SHA1

                                                                              ab6754cc9ebd922ef3c37b7e84ff20e250cfde3b

                                                                              SHA256

                                                                              65d97e83b315d9140f3922b278d08352809f955e2a714fedfaea6283a5300e53

                                                                              SHA512

                                                                              e9915f11e74c1bcf7f80d1bcdc8175df820af30f223a17c0fe11b6808e5a400550dcbe59b64346b7741c7c77735abefaf2c988753e11d086000522a05a0f7781

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                              Filesize

                                                                              62KB

                                                                              MD5

                                                                              c3c0eb5e044497577bec91b5970f6d30

                                                                              SHA1

                                                                              d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                              SHA256

                                                                              eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                              SHA512

                                                                              83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                              Filesize

                                                                              67KB

                                                                              MD5

                                                                              a074f116c725add93a8a828fbdbbd56c

                                                                              SHA1

                                                                              88ca00a085140baeae0fd3072635afe3f841d88f

                                                                              SHA256

                                                                              4cdcda7d8363be5bc824064259780779e7c046d56399c8a191106f55ce2ed8a6

                                                                              SHA512

                                                                              43ed55cda35bde93fc93c408908ab126e512c45611a994d7f4e5c85d4f2d90d573066082cb7b8dffce6a24a1f96cd534586646719b214ac7874132163faa5f28

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                              Filesize

                                                                              41KB

                                                                              MD5

                                                                              a7ee007fb008c17e73216d0d69e254e8

                                                                              SHA1

                                                                              160d970e6a8271b0907c50268146a28b5918c05e

                                                                              SHA256

                                                                              414024b478738b35312a098bc7f911300b14396d34718f78886b5942d9afe346

                                                                              SHA512

                                                                              669bec67d3fc1932a921dd683e6acfdf462b9063e1726770bae8740d83503a799c2e30030f2aca7ec96df0bfd6d8b7f999f8296ee156533302161eb7c9747602

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              2e86a72f4e82614cd4842950d2e0a716

                                                                              SHA1

                                                                              d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                              SHA256

                                                                              c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                              SHA512

                                                                              7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                              Filesize

                                                                              63KB

                                                                              MD5

                                                                              710d7637cc7e21b62fd3efe6aba1fd27

                                                                              SHA1

                                                                              8645d6b137064c7b38e10c736724e17787db6cf3

                                                                              SHA256

                                                                              c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                              SHA512

                                                                              19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                              SHA1

                                                                              386ba241790252df01a6a028b3238de2f995a559

                                                                              SHA256

                                                                              b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                              SHA512

                                                                              546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              9f8f80ca4d9435d66dd761fbb0753642

                                                                              SHA1

                                                                              5f187d02303fd9044b9e7c74e0c02fe8e6a646b7

                                                                              SHA256

                                                                              ab481b8b19b3336deda1b9ad4680cce4958152c9f9daa60c7bd8eb6786887359

                                                                              SHA512

                                                                              9c0de8e5bf16f096bf781189d813eeb52c3c8ec73fc791de10a8781e9942de06ed30ff5021ab7385c98686330049e3e610adc3e484e12ef807eec58607cfae63

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                              Filesize

                                                                              43KB

                                                                              MD5

                                                                              209af4da7e0c3b2a6471a968ba1fc992

                                                                              SHA1

                                                                              2240c2da3eba4f30b0c3ef2205ce7848ecff9e3f

                                                                              SHA256

                                                                              ecc145203f1c562cae7b733a807e9333c51d75726905a3af898154f3cefc9403

                                                                              SHA512

                                                                              09201e377e80a3d03616ff394d836c85712f39b65a3138924d62a1f3ede3eac192f1345761c012b0045393c501d48b5a774aeda7ab5d687e1d7971440dc1fc35

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

                                                                              Filesize

                                                                              73KB

                                                                              MD5

                                                                              cf604c923aae437f0acb62820b25d0fd

                                                                              SHA1

                                                                              84db753fe8494a397246ccd18b3bb47a6830bc98

                                                                              SHA256

                                                                              e2b4325bb9a706cbfba8f39cca5bde9dae935cbb1d6c8a562c62e740f2208ab4

                                                                              SHA512

                                                                              754219b05f2d81d11f0b54e5c7dd687bd82aa59a357a3074bca60fefd3a88102577db8ae60a11eb25cc9538af1da39d25fa6f38997bdc8184924d0c5920e89c8

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

                                                                              Filesize

                                                                              27KB

                                                                              MD5

                                                                              c3bd38af3c74a1efb0a240bf69a7c700

                                                                              SHA1

                                                                              7e4b80264179518c362bef5aa3d3a0eab00edccd

                                                                              SHA256

                                                                              1151160e75f88cbc8fe3ada9125cc2822abc1386c0eab7a1d5465cfd004522c8

                                                                              SHA512

                                                                              41a2852c8a38700cf4b38697f3a6cde3216c50b7ed23d80e16dea7f5700e074f08a52a10ba48d17111bb164c0a613732548fe65648658b52db882cacb87b9e8e

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              20fda5838ee9efc4a8f75123d6768933

                                                                              SHA1

                                                                              466b8fcecba8bbe14c42200c07f38b1bb1bbefe1

                                                                              SHA256

                                                                              2d9f97214102252b3661f663e5c06ea99085f50c21cb21818725d45addd7f64f

                                                                              SHA512

                                                                              1df9b8b396850579b920b9e256e207583b3ec5d4f7bfa0088c204c9519fd9e8005d25ca8be4193624efa84483b906c3d69d3c2de24d309a73527cef784496e25

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              873B

                                                                              MD5

                                                                              aa55e0e5501d9afa9e80fc1cae4d3135

                                                                              SHA1

                                                                              20b266b49370aa1fb8707259d640f3c88d494c49

                                                                              SHA256

                                                                              f5ce6306972e5a79ed99ede7405d66d3fbb5b4e457f96be955cf6582f754509f

                                                                              SHA512

                                                                              ad87538712f156e3d893155c75260629d6940f41dde9167111ec6651d255524f2b06ae1cadd4730b429dcb29a42172d11bee3f4326a04ad63571c955ec99b6c2

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              83e06b34855ceba1d856adca895df7b3

                                                                              SHA1

                                                                              cfb5f7e6f76f4ab53030c1811f53142aa143d05a

                                                                              SHA256

                                                                              ff52c678fadce461c9392f53c61bd162fdea7bae5f48c7b4bb3581e460d8efa0

                                                                              SHA512

                                                                              363646d4a1133c83af446d9fd539d780539cd01108d9adacc93fb0a71d302513742419dbb45a05664d4eed44d0cda122fbfd6a93908a9873abcaa204da605191

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              e052f7c929076c9687bc6e100bd5ec2a

                                                                              SHA1

                                                                              04937168591a6e2e6b0ef2edf40a038a5d6424c4

                                                                              SHA256

                                                                              1d16dfd70117f186c42c7dbf3794cc479ca6a9bc6b6bd707c65860423e257ea1

                                                                              SHA512

                                                                              b2ce70ddc65fe2ff579504482a646de2f789062dd9759e201edbb70056a8f6a6529c1c57570d654f6dc882a62fbd65995c2868b5a8dca7d785283e62492819c8

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              6102ce0d715e015aa5e86aa733101b07

                                                                              SHA1

                                                                              4c1c3c9d2592f9959b20b5e172c86cbb7b4239a9

                                                                              SHA256

                                                                              f2ea18e894b843694a98e7ca91785eca525142ba89e504b21141afd06e0a4637

                                                                              SHA512

                                                                              07ceda7f5761871dbee102cf00d0ff9fec431641abf6ab723133bbe644254bd5b69cb1090e6ae3cb81cdd0840084e2b4bf04b3c38381754a88b173f8d42c4a95

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              316cbdcb15794f7d2eb34bde19a3606f

                                                                              SHA1

                                                                              ad8148df716962417d4c0022937aac5367e9110d

                                                                              SHA256

                                                                              fa308dd574e87507882418f37dcac230c3a6d4d334990a711b24fee52c02e1f5

                                                                              SHA512

                                                                              1343b62dfa3c032c321bf09e3dd6bb58348d5bafbad13bffbe3ad2bcb02f331a1abb74bbfd73275705290d6b33e589e3f7b8641af6e1184bd46794dbc2cd7419

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              d31ffa1e8bfc5227a1411130d361de7e

                                                                              SHA1

                                                                              77a45676805670b81f89f82b2b9c0c9275c0c084

                                                                              SHA256

                                                                              b141fbcbe0842f95b55fac2d2e823d242d4923b53d95ee7bb257c90b8cd404d9

                                                                              SHA512

                                                                              b608c10eee1ddb9c22ff667df956af53d2d564e0b990001ac526852e5ab67f6c6ca25df3e566c2484a6c416d4129375933ad1cdb1a12ba9704361f4b4a1f318f

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              03a3a82bce531a9d602c569b8519a38a

                                                                              SHA1

                                                                              dd814d31d8084cb9c51923dc08314c59ec87fdca

                                                                              SHA256

                                                                              6103e9dac5e7c1c4edbfe65513f9b34415321d992aaf42e88866baf05e373133

                                                                              SHA512

                                                                              5d08d6bab3cd3a648fd91017c2436ba9783c3e4ec413c80e55b6622be849bd6e38c177f13d0781933df25b1f6d678ec718127ece1fe57ca140d7a2b25d9127dc

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              538B

                                                                              MD5

                                                                              979bfc30bfb292a521a127486b92532c

                                                                              SHA1

                                                                              ff891205cc59f17c222312f887a4c84a4418d3a7

                                                                              SHA256

                                                                              b8ed423b90badef0391d6e32530edbb25d7edd0c5803d2f72bbefee112e11fc6

                                                                              SHA512

                                                                              7c3e1c7c5884c8fc0ed47ad3b785f84858b13e39e788395c06263c962f5b14d5f4bcc9f60c70647e0d5840d4fa8e05078c17fc1255d3a8cbdbceee274317b436

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              f04e304290ae83d240e08ac0e7ea64ff

                                                                              SHA1

                                                                              81dd8d16115f3da37046c343382b1222c9645918

                                                                              SHA256

                                                                              214de1175b0fd8cb7b69a479aa8594cfbdde05c85ad43e5f629adde7b3cafb70

                                                                              SHA512

                                                                              16b8a240fc4b6cddccd115badf8be6eeef7db11ccb5f7fedf58fe48d97035c31d9c068ff5e0f13d55aacf15e8ebb1c6bd96dd0fba5bcb57bd1e817a5ace43acd

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              ff3f7f0be8548e3085c0daebba2a0c57

                                                                              SHA1

                                                                              8b5a3358d8a79ab4c2a13fda6aff3d92d9c039a1

                                                                              SHA256

                                                                              c8d8c463912263d27e12035c434d0e10514e57717cb80eecdf1246dee072c88d

                                                                              SHA512

                                                                              4ff4319f3ccfcbfc91d410825e3461b810116df16a610a896bdd57b6227fe16821e156baf2a7bc626c1fb2ff493b4838b1c1a9be52a1bb8ab008081b6fe6af9c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe62d413.TMP

                                                                              Filesize

                                                                              538B

                                                                              MD5

                                                                              eba571e39b84efdb57a9e9e8f52e6580

                                                                              SHA1

                                                                              9be4361d147d692204f8ad5d3ce1f74f6bc782ee

                                                                              SHA256

                                                                              d85c80426df397e5e24539e58334cdb74c786eae4ac9313a13baaeb033310cc4

                                                                              SHA512

                                                                              c5cc8d827e1714c53cc0a00745b38555ce0d4a6b6d27a88fb082e7fcdf55c719217338e9bd7731290dcc4e90487c6dfcd903d1e9d5d0d858731c2458dcf45e2e

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              46295cac801e5d4857d09837238a6394

                                                                              SHA1

                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                              SHA256

                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                              SHA512

                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              206702161f94c5cd39fadd03f4014d98

                                                                              SHA1

                                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                              SHA256

                                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                              SHA512

                                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db

                                                                              Filesize

                                                                              16KB

                                                                              MD5

                                                                              9a8e0fb6cf4941534771c38bb54a76be

                                                                              SHA1

                                                                              92d45ac2cc921f6733e68b454dc171426ec43c1c

                                                                              SHA256

                                                                              9ee9211a57c3f6fa211fe0323fa8cd521e7cbffcd8ff0896645a45795dc472be

                                                                              SHA512

                                                                              12ed22537dcc79d53f6c7d39e92a38f8fea076d793198928f5b7a5dd1234d50a3c0b4815632f3fadf8bc4ef0499773d22bd83f961d2d0ffd8afacf471bd3a5ae

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\previews_opt_out.db

                                                                              Filesize

                                                                              16KB

                                                                              MD5

                                                                              d926f072b41774f50da6b28384e0fed1

                                                                              SHA1

                                                                              237dfa5fa72af61f8c38a1e46618a4de59bd6f10

                                                                              SHA256

                                                                              4f7b0e525d4bfc53d5df49589e25a0bccf2fcf6a1a0ca3f94d3285bb9cf0a249

                                                                              SHA512

                                                                              a140df6ec0d3099ef374e8f3ece09bf91bc896ac4a1d251799a521543fe9bdea796ba09fa47932bd54fa939118495078f9258557b32c31d3d4011b0666a4723f

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              ca9a71d7e3f35030935e01df12a5b1a1

                                                                              SHA1

                                                                              1b1bd187d8402909d8f7d10c49c63923ca521b9d

                                                                              SHA256

                                                                              1da9327583d1bb6613f72b2cf33960b42a68754a94ec0fadddb5a472cf486187

                                                                              SHA512

                                                                              c9da52245aa5559f9d8ac7020251d62aa1438eefde9c1ff768eb552eef92cff82befb2b5faa5e0bfc6a1560e4c2c75165240121e0559640986d678a05c0cbdc2

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              d69c94b4bc4e8669685529b2b4b8eb76

                                                                              SHA1

                                                                              da92ba2bcc220cc1973d1986931a8393e834690f

                                                                              SHA256

                                                                              c9049be9656d2a0b6095b05cfaa4fbd88dd1a5ef46b8723d08eddbb8a7732391

                                                                              SHA512

                                                                              da115e2f4bfed3dfd1a1a8113eb48506b462d70291a70f4ee53f0e007d88a2c68c8628272fcd2fda5b9fe378f3c060378efcd4503ea7f11041fc0347e8ef3bce

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              d6d9eeec6b6f1644cf420605b3ad7d99

                                                                              SHA1

                                                                              74a514200ed583391375227d63dec0dac9b2a848

                                                                              SHA256

                                                                              7c67d4f30d150170340f7352f54336ecc5ce931f1bfa6986b21b77494ab96efd

                                                                              SHA512

                                                                              cb15c1db588944ab1f9ad4feab9ce02b1ec2e3f15a4c8aed249531ea08b6677c8e8a8147c74e612a0da8d2de65f4faf0308f6aba8e3165750c5c4e551562dfc4

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db

                                                                              Filesize

                                                                              24KB

                                                                              MD5

                                                                              8665de22b67e46648a5a147c1ed296ca

                                                                              SHA1

                                                                              b289a96fee9fa77dd8e045ae8fd161debd376f48

                                                                              SHA256

                                                                              b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

                                                                              SHA512

                                                                              bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

                                                                            • C:\Users\Admin\AppData\Local\Temp\11.WCRYT

                                                                              Filesize

                                                                              474B

                                                                              MD5

                                                                              8c747809f440565ae31ff56fc6ee3726

                                                                              SHA1

                                                                              ef010d0ba47bd09652b4910e72ddac78e3c76cf4

                                                                              SHA256

                                                                              38de07ecb4fd6c81a4b4d0d5e9a30feac3bba198eccdee8271fef4ae005dc9d1

                                                                              SHA512

                                                                              cc3637528185ddc8a3e6b79aeb3945ca67282d9588a552606547bbef88a77e8195e50a29aa676041fb2263651fde4986f74011acbc3eb49923d7f250b01759ca

                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\!Please Read Me!.txt

                                                                              Filesize

                                                                              797B

                                                                              MD5

                                                                              afa18cf4aa2660392111763fb93a8c3d

                                                                              SHA1

                                                                              c219a3654a5f41ce535a09f2a188a464c3f5baf5

                                                                              SHA256

                                                                              227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0

                                                                              SHA512

                                                                              4161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b

                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\00000000.res

                                                                              Filesize

                                                                              136B

                                                                              MD5

                                                                              cd4e08bd91c314f50a419973aba8d8b8

                                                                              SHA1

                                                                              d8332e40005df365ac40723170a5c8778784dac0

                                                                              SHA256

                                                                              8ce324159be4dc3a0a09d5d6c8ce880f402f30b4c730d06aadd3bb8770c0ba36

                                                                              SHA512

                                                                              ac77d23c12ce5d093b0164ca5a098e572bb7a806f55a44bee0cdae6aa694b12d35aea8b31ad6f6d97ecafc7939df91832aa870184a922fbecc6630859ddd64b7

                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\c.wry

                                                                              Filesize

                                                                              628B

                                                                              MD5

                                                                              700d8c84e6715e6485bd6a6b864422e5

                                                                              SHA1

                                                                              bb4b1b3259b1b84ab8391aa62e7cfe814f137163

                                                                              SHA256

                                                                              fb3405206023f577a9574701888771fa5acd9ec6e36a7495a9e653ec62841dd4

                                                                              SHA512

                                                                              87b617cd55d0a1397a9f105731c0eba4df31c084289c01251b59f97e83844200027611f13a5c9c43191aabf6f31cd5d1576ca0b3d179de393992e091daa3119e

                                                                            • C:\Users\Admin\AppData\Local\Temp\Temp1_The-MALWARE-Repo-master.zip\The-MALWARE-Repo-master\Ransomware\u.wry

                                                                              Filesize

                                                                              236KB

                                                                              MD5

                                                                              cf1416074cd7791ab80a18f9e7e219d9

                                                                              SHA1

                                                                              276d2ec82c518d887a8a3608e51c56fa28716ded

                                                                              SHA256

                                                                              78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                                                              SHA512

                                                                              0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                                                            • C:\Users\Admin\AppData\Local\Temp\install.bat

                                                                              Filesize

                                                                              206B

                                                                              MD5

                                                                              6c9c8a46e8c127988afde082e2b25816

                                                                              SHA1

                                                                              a9070da5b23c033956f7f1a2dfd0300fe95b9c46

                                                                              SHA256

                                                                              709f8eddb5e2438355af79762499a07100625fe8c789d319319dc6d73b6b83e8

                                                                              SHA512

                                                                              9b445e01ac02a38323fd6e734768f451acac5c998106dad5d13374054c9f051d9f9900c73caa4193d34e8570cb0641498aedaa1025c4d32fa616a4702c432362

                                                                            • C:\Users\Admin\AppData\Local\Temp\tmp565F.tmp

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              5c2af0284d1b7c0f0f9cb80833e4e0b8

                                                                              SHA1

                                                                              573e5a069082cab0d27bf51cd7b13227d62289d6

                                                                              SHA256

                                                                              215aa7244c8f3b8e1353e6a9ac6d7e4efcd3833f19ab2e9f23df9b18ba263884

                                                                              SHA512

                                                                              72c31e38125f38bf1354aea6b210bc54802620071807a90384ec88068c5602662c3521c9b21d90eee7072433dfe1cefd4baa529f4f385430fc8e7b0d10f7802d

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\~WRD0000.tmp

                                                                              Filesize

                                                                              31KB

                                                                              MD5

                                                                              d0aa58256cb4eb43cb8c4a725d78a0c1

                                                                              SHA1

                                                                              b96af74020ec02a7b98fb8220e93d4f299fbf533

                                                                              SHA256

                                                                              f44864f4db83655d7bd12eb89ad695d0e2ab431745b70cea8b63fcb7e5df592e

                                                                              SHA512

                                                                              948439aa7c3b16023707c078ade92b042109b49841c468aebba38b98d660df5d473bec2caa36cefdea6d8a718a2a96c444efb78ae6ef24db6c71d8b29e527d97

                                                                            • C:\Windows\SysWOW64\Userdata\Userdata.exe

                                                                              Filesize

                                                                              92KB

                                                                              MD5

                                                                              fb598b93c04baafe98683dc210e779c9

                                                                              SHA1

                                                                              c7ccd43a721a508b807c9bf6d774344df58e752f

                                                                              SHA256

                                                                              c851749fd6c9fa19293d8ee2c5b45b3dc8561115ddfe7166fbaefcb9b353b7c4

                                                                              SHA512

                                                                              1185ffe7e296eaaae50b7bd63baa6ffb8f5e76d4a897cb3800cead507a67c4e5075e677abdbf9831f3f81d01bdf1c06675a7c21985ef20a4bae5a256fd41cc0f

                                                                            • \??\pipe\LOCAL\crashpad_2684_QQZDQABKUPARYTJE

                                                                              MD5

                                                                              d41d8cd98f00b204e9800998ecf8427e

                                                                              SHA1

                                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                              SHA256

                                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                              SHA512

                                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                            • memory/656-905-0x00000000056C0000-0x00000000056E8000-memory.dmp

                                                                              Filesize

                                                                              160KB

                                                                            • memory/656-902-0x0000000005360000-0x00000000053F2000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/656-903-0x0000000004ED0000-0x0000000004ED8000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/656-904-0x0000000005760000-0x00000000057FC000-memory.dmp

                                                                              Filesize

                                                                              624KB

                                                                            • memory/656-900-0x0000000000480000-0x00000000004D6000-memory.dmp

                                                                              Filesize

                                                                              344KB

                                                                            • memory/656-901-0x0000000005830000-0x0000000005DD6000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/1268-915-0x0000000010410000-0x000000001047E000-memory.dmp

                                                                              Filesize

                                                                              440KB

                                                                            • memory/1868-1809-0x0000025C47060000-0x0000025C485EE000-memory.dmp

                                                                              Filesize

                                                                              21.6MB

                                                                            • memory/1868-1808-0x0000025C2B9F0000-0x0000025C2C9E4000-memory.dmp

                                                                              Filesize

                                                                              16.0MB

                                                                            • memory/2892-897-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-895-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-803-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-898-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-896-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-804-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-805-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-807-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-809-0x00007FFD71250000-0x00007FFD71260000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-808-0x00007FFD71250000-0x00007FFD71260000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2892-806-0x00007FFD734F0000-0x00007FFD73500000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3300-917-0x00000000006B0000-0x00000000006B1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/3300-916-0x00000000001F0000-0x00000000001F1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/4892-912-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                              Filesize

                                                                              1.3MB

                                                                            • memory/4892-914-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                              Filesize

                                                                              1.3MB