Resubmissions

13-08-2024 00:37

240813-ayqxyazdlp 10

13-08-2024 00:16

240813-aks55syfrm 8

13-08-2024 00:15

240813-ajyn8stdlg 3

Analysis

  • max time kernel
    207s
  • max time network
    210s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13-08-2024 00:37

Errors

Reason
Machine shutdown

General

Malware Config

Signatures

  • CryptoLocker

    Ransomware family with multiple variants.

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Troldesh, Shade, Encoder.858

    Troldesh is a ransomware spread by malspam.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Renames multiple (557) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Disables RegEdit via registry modification 2 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 5 IoCs
  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 7 IoCs
  • Drops desktop.ini file(s) 64 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 5 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Interacts with shadow copies 3 TTPs 2 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 14 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 37 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Da2dalus/The-MALWARE-Repo
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff3e6c3cb8,0x7fff3e6c3cc8,0x7fff3e6c3cd8
      2⤵
        PID:3608
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1888 /prefetch:2
        2⤵
          PID:4704
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1080
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:8
          2⤵
            PID:2028
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:2060
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
              2⤵
                PID:3388
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4132 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4168
              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:8
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4692
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:1
                2⤵
                  PID:4604
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:1
                  2⤵
                    PID:4432
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                    2⤵
                      PID:4320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3692 /prefetch:1
                      2⤵
                        PID:4916
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                        2⤵
                          PID:2476
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6172 /prefetch:8
                          2⤵
                            PID:2912
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:8
                            2⤵
                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3240
                          • C:\Users\Admin\Downloads\CryptoLocker.exe
                            "C:\Users\Admin\Downloads\CryptoLocker.exe"
                            2⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • NTFS ADS
                            PID:412
                            • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                              "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" "/rC:\Users\Admin\Downloads\CryptoLocker.exe"
                              3⤵
                              • Executes dropped EXE
                              • Adds Run key to start application
                              • System Location Discovery: System Language Discovery
                              PID:772
                              • C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe
                                "C:\Users\Admin\AppData\Roaming\{34184A33-0407-212E-3320-09040709E2C2}.exe" /w00000244
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:724
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1660 /prefetch:1
                            2⤵
                              PID:2952
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6440 /prefetch:8
                              2⤵
                                PID:2008
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:8
                                2⤵
                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                • NTFS ADS
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5004
                              • C:\Users\Admin\Downloads\CoronaVirus.exe
                                "C:\Users\Admin\Downloads\CoronaVirus.exe"
                                2⤵
                                • Drops startup file
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Drops desktop.ini file(s)
                                • Drops file in System32 directory
                                • Drops file in Program Files directory
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4640
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe"
                                  3⤵
                                    PID:2176
                                    • C:\Windows\system32\mode.com
                                      mode con cp select=1251
                                      4⤵
                                        PID:2464
                                      • C:\Windows\system32\vssadmin.exe
                                        vssadmin delete shadows /all /quiet
                                        4⤵
                                        • Interacts with shadow copies
                                        PID:5512
                                    • C:\Windows\system32\cmd.exe
                                      "C:\Windows\system32\cmd.exe"
                                      3⤵
                                        PID:32940
                                        • C:\Windows\system32\mode.com
                                          mode con cp select=1251
                                          4⤵
                                            PID:30388
                                          • C:\Windows\system32\vssadmin.exe
                                            vssadmin delete shadows /all /quiet
                                            4⤵
                                            • Interacts with shadow copies
                                            PID:31708
                                        • C:\Windows\System32\mshta.exe
                                          "C:\Windows\System32\mshta.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                          3⤵
                                            PID:30360
                                          • C:\Windows\System32\mshta.exe
                                            "C:\Windows\System32\mshta.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta"
                                            3⤵
                                              PID:30616
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5688 /prefetch:2
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:33416
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:31332
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5696 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:12884
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4944 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            PID:33964
                                          • C:\Users\Admin\Downloads\Krotten.exe
                                            "C:\Users\Admin\Downloads\Krotten.exe"
                                            2⤵
                                            • Disables RegEdit via registry modification
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Modifies WinLogon
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            • Modifies Control Panel
                                            • Modifies Internet Explorer settings
                                            • Modifies Internet Explorer start page
                                            • Modifies registry class
                                            • Suspicious use of AdjustPrivilegeToken
                                            • System policy modification
                                            PID:34088
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:1
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:34312
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4640 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:34408
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3684 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            PID:34460
                                          • C:\Users\Admin\Downloads\NoMoreRansom.exe
                                            "C:\Users\Admin\Downloads\NoMoreRansom.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • System Location Discovery: System Language Discovery
                                            PID:34536
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6236 /prefetch:1
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:34888
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6676 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:34996
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1876,12609820176203757820,12018954096203929019,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1932 /prefetch:8
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            PID:35136
                                          • C:\Users\Admin\Downloads\PowerPoint.exe
                                            "C:\Users\Admin\Downloads\PowerPoint.exe"
                                            2⤵
                                            • Executes dropped EXE
                                            • Writes to the Master Boot Record (MBR)
                                            • System Location Discovery: System Language Discovery
                                            • NTFS ADS
                                            PID:35244
                                            • C:\Users\Admin\AppData\Local\Temp\sys3.exe
                                              C:\Users\Admin\AppData\Local\Temp\\sys3.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Writes to the Master Boot Record (MBR)
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:35284
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:496
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:2904
                                            • C:\Windows\system32\vssvc.exe
                                              C:\Windows\system32\vssvc.exe
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:22800
                                            • C:\Windows\system32\LogonUI.exe
                                              "LogonUI.exe" /flags:0x4 /state0:0xa38d9855 /state1:0x41c64e6d
                                              1⤵
                                              • Modifies data under HKEY_USERS
                                              • Suspicious use of SetWindowsHookEx
                                              PID:35304

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.id-6B81D458.[[email protected]].ncov

                                              Filesize

                                              2.7MB

                                              MD5

                                              caf61108d89ce0c19021927467704cef

                                              SHA1

                                              b01edc8d2ad0cf308ebaa2feadeec0a0d0b61f8e

                                              SHA256

                                              7be7c789f5d3c16020a3947db3887b01e92054214aced2227cc6fa6b401d9d59

                                              SHA512

                                              08b215fec1bd2e99015998c7f119d5e0da2cf06c8dd467e2d110e042477de0a683522b7d29d3d09324a6f4e81b1b8e2f7e9ba0e86f741d56446bc08634c2ae07

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              a8276eab0f8f0c0bb325b5b8c329f64f

                                              SHA1

                                              8ce681e4056936ca8ccd6f487e7cd7cccbae538b

                                              SHA256

                                              847f60e288d327496b72dbe1e7aa1470a99bf27c0a07548b6a386a6188cd72da

                                              SHA512

                                              42f91bf90e92220d0731fa4279cc5773d5e9057a9587f311bee0b3f7f266ddceca367bd0ee7f1438c3606598553a2372316258c05e506315e4e11760c8f13918

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                              Filesize

                                              152B

                                              MD5

                                              058032c530b52781582253cb245aa731

                                              SHA1

                                              7ca26280e1bfefe40e53e64345a0d795b5303fab

                                              SHA256

                                              1c3a7192c514ef0d2a8cf9115cfb44137ca98ec6daa4f68595e2be695c7ed67e

                                              SHA512

                                              77fa3cdcd53255e7213bb99980049e11d6a2160f8130c84bd16b35ba9e821a4e51716371526ec799a5b4927234af99e0958283d78c0799777ab4dfda031f874f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\59454048-2a2f-44dd-aac0-1fcdab3a358a.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              8293c4ab8526ea1109130cac2bbad941

                                              SHA1

                                              bc622b273614fc8811a4dfe4ade257dae33cd2b5

                                              SHA256

                                              d6dfb3a982f652275f0258bcc10f3861412377bf451e7e7eaef06a020085e753

                                              SHA512

                                              2619ff3b10504afacb2f65a666c66e4fd97449afaab5d090cb0ff5a103b885d03740387907ae9672b5fa2741a192b2bf06ed944c00fcffd6be7a627555881caa

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                              Filesize

                                              2KB

                                              MD5

                                              2cbee678c9702537e4fb8db4faf43858

                                              SHA1

                                              9c9b7d22672848e46eed111fef51c63c04fe5139

                                              SHA256

                                              3bb2f0077f8404f344d33063056240fc547c781d359013a1c71a43ae7d71f848

                                              SHA512

                                              3d122b2e452a09b33c8162ac55593dcf422ce3192ef2b478a27c6702aea4bb271531ed27584e2a14e84459c57d8bce938dbd5632b4eeeecfab0a5881308c25ec

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              5KB

                                              MD5

                                              3698454e84fa7b0cc5c801954f2f99be

                                              SHA1

                                              7017d04b0924b8a09b7604f849fa12afe3d093aa

                                              SHA256

                                              badf6beb8e7e43caefde49aa8eba3622c04ad8f59b52ccaefb04cbf9b8825606

                                              SHA512

                                              d49a9802a83a23ac9ea1e1b1fef6cbc3abe5197062db3849ccf07ee41cc4e497160f6540dc26cf12c88f9350d227b650b2cb95edfce6d34220fd9c199c6f0678

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                              Filesize

                                              6KB

                                              MD5

                                              737df61f488327b3885f1e6766c1d9b9

                                              SHA1

                                              c03f0e35f71e8d344cc88be8260099d98ed0f4d1

                                              SHA256

                                              656b90dabce15d5c3db1b6c7a57bf1f1ebca9f536f3673e638e106f5f0d974cc

                                              SHA512

                                              67608f8cb1bb1c80483df507819ad8bdc3bfd521a10df866966e9b919970b47ad37a7df3d03f595eaecc8b26b01bd8f1772e38c491035d1657a847e5ff515cdd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              a95e9dab10c34d105958548764bdcb10

                                              SHA1

                                              c86babd92934360fd692cd31c48a3ef5be3acba8

                                              SHA256

                                              b8175cbfd6e8ec925476840a5e3670b51b4518f8d65aff3d771e5a073f2af853

                                              SHA512

                                              a067d1d6c6273b3ebaaa2a829c6b2598a6069985b684904497af95a05e68e9598641f38b71e8645b37c73bdfc525083efeebe14a7eddce1597e257c1d3454e20

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              a1f4db55b5e479186449bf9dc44e9304

                                              SHA1

                                              36c66e13050e2bb68e014338e2b61287a4993a89

                                              SHA256

                                              53511dd55c455955a9c1bb84460dcca4a4481ed113f9ca87fa52c6bf299fb54c

                                              SHA512

                                              1c607ab2346d4b081761f4a330284715bdd74b3a90e71a564238ec705bee871c61aa146d70782e306cbdb8c1e7046bbe0f6b7ae5315eb6005ee5ba09929bdcab

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              6e3f5c65cc0bac09c3f0a493ed065264

                                              SHA1

                                              45c1e4d40761f75594f5d0422e9ee2c13bfa9ec0

                                              SHA256

                                              4ed6ba6559024a328cda5019b3099147167025ddc7e0b32154d4192084d1758c

                                              SHA512

                                              cbaa26d4710aac10d0c6984d7d1add0024d6813bc332ae37ad0b61e356da742f124d0f69d56be0aca38ba743723b17f0f4b44ec680b1872d5d51f05568311ab6

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              0ad20e672401c604605f4c6cf5758cf1

                                              SHA1

                                              98b74ec4407542e09ca6a4ad1a1ab01411527083

                                              SHA256

                                              2951ca464cdda14847c252dbbfc57410eb6a9fea9b186f80a23440d927d9b4ae

                                              SHA512

                                              bbc14fb83a341422f2501abae761715f355f6800a1179a413ab54bcf94bfefbb966add9b22402419bc36d98e38b238bea5c7ce1d144cb0802535899ebb5b6f1c

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                              Filesize

                                              1KB

                                              MD5

                                              e587bb90c5d68deec97c45bd6ecf2308

                                              SHA1

                                              cabe0ff083e66715c98d3f0a97dde5c15681f5d4

                                              SHA256

                                              57ebc5fa1b2acca08ae336770b08b43173d5ea3b63daaaa77df39f6c8bc73712

                                              SHA512

                                              70ed6c9daf4e697eb2d51de929f89be41b083b9a63ca9d6870449ba49cd70316c3d8cde56f615a4626a03a2fa502579cfca0f9cf3ae3964fa983c82f1c8f72f4

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f339.TMP

                                              Filesize

                                              874B

                                              MD5

                                              4ae148ca45a337a34d6d471b185a9fe0

                                              SHA1

                                              0189fd6ffc97209eff76658656c86c52e4ddd3b1

                                              SHA256

                                              e8e2d43b62a41790e39a6a565c6ed1583c36f7b62294956ef7bbc1c9635bd454

                                              SHA512

                                              88d157768b75e4915d75e044d081e52b505c97bcc629f04da72000548c11777d0cbe99abecdfc2d3fd8e15c7d0c981284d86d37c612586550202da45c291698b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe592a91.TMP

                                              Filesize

                                              1KB

                                              MD5

                                              2995ead59c232d8fbe60fcaca2e1b810

                                              SHA1

                                              393ddb320838a6b02cd98a70a82a1a616f96b76d

                                              SHA256

                                              2d68e8b681d2494ee52e1bf9b9dceba0c8814e2c08d81288042305dc1f049f21

                                              SHA512

                                              9a0567e1ac80f9f41fd7e6769b30734a4b0238e6c120e048098f5309db637d9ccb8d9c454380167d66adb6c3599571feee75e4676e898b9aecb0c40348f0a4dd

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              46295cac801e5d4857d09837238a6394

                                              SHA1

                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                              SHA256

                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                              SHA512

                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                              Filesize

                                              16B

                                              MD5

                                              206702161f94c5cd39fadd03f4014d98

                                              SHA1

                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                              SHA256

                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                              SHA512

                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\heavy_ad_intervention_opt_out.db

                                              Filesize

                                              16KB

                                              MD5

                                              9a8e0fb6cf4941534771c38bb54a76be

                                              SHA1

                                              92d45ac2cc921f6733e68b454dc171426ec43c1c

                                              SHA256

                                              9ee9211a57c3f6fa211fe0323fa8cd521e7cbffcd8ff0896645a45795dc472be

                                              SHA512

                                              12ed22537dcc79d53f6c7d39e92a38f8fea076d793198928f5b7a5dd1234d50a3c0b4815632f3fadf8bc4ef0499773d22bd83f961d2d0ffd8afacf471bd3a5ae

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\previews_opt_out.db

                                              Filesize

                                              16KB

                                              MD5

                                              d926f072b41774f50da6b28384e0fed1

                                              SHA1

                                              237dfa5fa72af61f8c38a1e46618a4de59bd6f10

                                              SHA256

                                              4f7b0e525d4bfc53d5df49589e25a0bccf2fcf6a1a0ca3f94d3285bb9cf0a249

                                              SHA512

                                              a140df6ec0d3099ef374e8f3ece09bf91bc896ac4a1d251799a521543fe9bdea796ba09fa47932bd54fa939118495078f9258557b32c31d3d4011b0666a4723f

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              855ec504440d66576e40ae2eb73836f4

                                              SHA1

                                              fb882cc9603afa4cbbd0573925e8d2a90778b8f0

                                              SHA256

                                              31df65cdb2b18122d006657c32c82f1d642a5d93ae6002c3265eb4008cecb912

                                              SHA512

                                              80b0267c35749e33d96de34c5c8daf671f41ac2d59c1d8d6d8bd47fd3df8b24694d3a64846208913590190680222d0b480d9600101722ecb90b720bbaa3de506

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              1e3cca7616ab037c96797800423e3bbd

                                              SHA1

                                              becb71655d59451b9ef6ce872d4df18a95438391

                                              SHA256

                                              122e297957146722a11b70ba002bdf7c199b90b6b7a1c0e0f6e912f594ccb0a0

                                              SHA512

                                              93390aa2131a0ac93240a8c519429eb2881b71372e8e285b374258a9836ea5d3bc7f86cd5092b3fe080f24a2af3da0548be06d57ea031907897dc78c91104e0b

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              510328c30a90e9e341828ddaeb2e8dc0

                                              SHA1

                                              3c42c43325082618daa35f2b8af8f8ee7387ffbd

                                              SHA256

                                              7d613aea5f97a4446824a97551239ad98876f21a49c7cac70c67931218295f82

                                              SHA512

                                              9a19c67de34d107e5c3f23e4e9da6ef1b796b9f2faafbd2c7f7bd022d0b8603e076a2e4329c389f46801fb65889461c22f4151f1296fdec50123a6f795436faa

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              dbdcefe8351e0387dabcac140daf1168

                                              SHA1

                                              6a6952f7d2db9c365efa1651b00f9e6798f5c33a

                                              SHA256

                                              711bd4aadc37d45b4b5fcd567bce27edd822c1da15156cfc7049fd379c7b8f64

                                              SHA512

                                              3f2f920b39566e497c77f8d7317dcb743ddefac4ded97c6d6920d174a0a8cdc72ecb656bf996e2e217f8ecc7fae15277346ef9e846b35615f50e501da90a1ad5

                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                              Filesize

                                              11KB

                                              MD5

                                              d9917f04fffc02ebdfccde87174514f6

                                              SHA1

                                              e9ceacaead9f6855de469f0c22f0b165a4bf7c05

                                              SHA256

                                              a9c2abc34b24cdcdd489f548e439229ca395ab7a352cf71fa4626571601fae34

                                              SHA512

                                              006f599385833ebe77e463d1465ca493eeb150ab249a07f9dfdd544dce3311e7e88bf343365158fd30342f6d1313718d7cbc93e0d61c9c6ba5f60c509d1dc539

                                            • C:\Users\Admin\Downloads\CoronaVirus.exe:Zone.Identifier

                                              Filesize

                                              55B

                                              MD5

                                              0f98a5550abe0fb880568b1480c96a1c

                                              SHA1

                                              d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                              SHA256

                                              2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                              SHA512

                                              dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                            • C:\Users\Admin\Downloads\CryptoLocker.exe:Zone.Identifier

                                              Filesize

                                              26B

                                              MD5

                                              fbccf14d504b7b2dbcb5a5bda75bd93b

                                              SHA1

                                              d59fc84cdd5217c6cf74785703655f78da6b582b

                                              SHA256

                                              eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                              SHA512

                                              aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                            • C:\Users\Admin\Downloads\Unconfirmed 445019.crdownload

                                              Filesize

                                              338KB

                                              MD5

                                              04fb36199787f2e3e2135611a38321eb

                                              SHA1

                                              65559245709fe98052eb284577f1fd61c01ad20d

                                              SHA256

                                              d765e722e295969c0a5c2d90f549db8b89ab617900bf4698db41c7cdad993bb9

                                              SHA512

                                              533d6603f6e2a77bd1b2c6591a135c4717753d53317c1be06e43774e896d9543bcd0ea6904a0688aa84b2d8424641d68994b1e7dc4aa46d66c36feecb6145444

                                            • C:\Users\Admin\Downloads\Unconfirmed 530947.crdownload

                                              Filesize

                                              53KB

                                              MD5

                                              87ccd6f4ec0e6b706d65550f90b0e3c7

                                              SHA1

                                              213e6624bff6064c016b9cdc15d5365823c01f5f

                                              SHA256

                                              e79f164ccc75a5d5c032b4c5a96d6ad7604faffb28afe77bc29b9173fa3543e4

                                              SHA512

                                              a72403d462e2e2e181dbdabfcc02889f001387943571391befed491aaecba830b0869bdd4d82bca137bd4061bbbfb692871b1b4622c4a7d9f16792c60999c990

                                            • C:\Users\Admin\Downloads\Unconfirmed 838859.crdownload

                                              Filesize

                                              136KB

                                              MD5

                                              70108103a53123201ceb2e921fcfe83c

                                              SHA1

                                              c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3

                                              SHA256

                                              9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d

                                              SHA512

                                              996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b

                                            • C:\Users\Admin\Downloads\Unconfirmed 872443.crdownload

                                              Filesize

                                              1.4MB

                                              MD5

                                              63210f8f1dde6c40a7f3643ccf0ff313

                                              SHA1

                                              57edd72391d710d71bead504d44389d0462ccec9

                                              SHA256

                                              2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f

                                              SHA512

                                              87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11

                                            • C:\Users\Admin\Downloads\Unconfirmed 872443.crdownload:SmartScreen

                                              Filesize

                                              7B

                                              MD5

                                              4047530ecbc0170039e76fe1657bdb01

                                              SHA1

                                              32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                              SHA256

                                              82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                              SHA512

                                              8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                            • C:\Users\Admin\Downloads\Unconfirmed 99028.crdownload

                                              Filesize

                                              1.0MB

                                              MD5

                                              055d1462f66a350d9886542d4d79bc2b

                                              SHA1

                                              f1086d2f667d807dbb1aa362a7a809ea119f2565

                                              SHA256

                                              dddf7894b2e6aafa1903384759d68455c3a4a8348a7e2da3bd272555eba9bec0

                                              SHA512

                                              2c5e570226252bdb2104c90d5b75f11493af8ed1be8cb0fd14e3f324311a82138753064731b80ce8e8b120b3fe7009b21a50e9f4583d534080e28ab84b83fee1

                                            • memory/4640-373-0x0000000000400000-0x000000000056F000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/4640-339-0x0000000000400000-0x000000000056F000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/4640-5131-0x0000000000400000-0x000000000056F000-memory.dmp

                                              Filesize

                                              1.4MB

                                            • memory/34536-25714-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25716-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25713-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25744-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25775-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25784-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/34536-25712-0x0000000000400000-0x00000000005DE000-memory.dmp

                                              Filesize

                                              1.9MB

                                            • memory/35244-25776-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                              Filesize

                                              144KB

                                            • memory/35244-25782-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                              Filesize

                                              144KB