Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 19:20

General

  • Target

    7e5fbac8a474b8082983455af8102f63b20606b6c85287c4fd5766c9cb673b45.exe

  • Size

    1.8MB

  • MD5

    2823c875bca3fe7550bfe5ca70b94ef1

  • SHA1

    ccf3255d4fbde389c7de5a1acbf782257f354cba

  • SHA256

    7e5fbac8a474b8082983455af8102f63b20606b6c85287c4fd5766c9cb673b45

  • SHA512

    04f4e84b03d37b9d0710378848e340819fbb570922bbe3f61a0c677d260b4c2e49bb13491b3703457ffcdcd95b3611118d3f4ff1e57b9eb4dc985f77c0d3b2fb

  • SSDEEP

    49152:NJHBRgsV055BgRlTYzeZMtEevhXX3qjir0yt:NJh+scSRlUzey+evhXnqB

Malware Config

Extracted

Family

amadey

Version

4.41

Botnet

c7817d

C2

http://31.41.244.10

Attributes
  • install_dir

    0e8d0864aa

  • install_file

    svoutse.exe

  • strings_key

    5481b88a6ef75bcf21333988a4e47048

  • url_paths

    /Dem7kTu/index.php

rc4.plain

Extracted

Family

stealc

Botnet

rave

C2

http://185.215.113.103

Attributes
  • url_path

    /e2b1563c6670f193.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Stealc

    Stealc is an infostealer written in C++.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 29 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e5fbac8a474b8082983455af8102f63b20606b6c85287c4fd5766c9cb673b45.exe
    "C:\Users\Admin\AppData\Local\Temp\7e5fbac8a474b8082983455af8102f63b20606b6c85287c4fd5766c9cb673b45.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1584
    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
      "C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\1000030001\6eeb5954d1.exe
        "C:\Users\Admin\AppData\Local\Temp\1000030001\6eeb5954d1.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4420
      • C:\Users\Admin\AppData\Local\Temp\1000033001\9933230cad.exe
        "C:\Users\Admin\AppData\Local\Temp\1000033001\9933230cad.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4376
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --kiosk --edge-kiosk-type=fullscreen --no-first-run --disable-features=TranslateUI --disable-popup-blocking --disable-extensions --no-default-browser-check --app=https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password
          4⤵
          • Enumerates system info in registry
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4428
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb94446f8,0x7ffdb9444708,0x7ffdb9444718
            5⤵
              PID:2832
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
              5⤵
                PID:4816
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:2596
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:8
                5⤵
                  PID:964
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                  5⤵
                    PID:656
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
                    5⤵
                      PID:1636
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3888 /prefetch:1
                      5⤵
                        PID:3972
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3900 /prefetch:1
                        5⤵
                          PID:4416
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:1
                          5⤵
                            PID:3644
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:1
                            5⤵
                              PID:4552
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:1
                              5⤵
                                PID:2260
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4524 /prefetch:1
                                5⤵
                                  PID:3112
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4580 /prefetch:1
                                  5⤵
                                    PID:2844
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:1
                                    5⤵
                                      PID:4744
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
                                      5⤵
                                        PID:4868
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:1
                                        5⤵
                                          PID:2288
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                                          5⤵
                                            PID:1660
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                                            5⤵
                                              PID:864
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:1
                                              5⤵
                                                PID:2088
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:1
                                                5⤵
                                                  PID:208
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                                                  5⤵
                                                    PID:3084
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4812 /prefetch:1
                                                    5⤵
                                                      PID:2472
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                                      5⤵
                                                        PID:4696
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:1
                                                        5⤵
                                                          PID:3492
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                                          5⤵
                                                            PID:4440
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:1
                                                            5⤵
                                                              PID:4284
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:1
                                                              5⤵
                                                                PID:2016
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                                                5⤵
                                                                  PID:4988
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:1
                                                                  5⤵
                                                                    PID:3332
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:1
                                                                    5⤵
                                                                      PID:3140
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                                                                      5⤵
                                                                        PID:1720
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                                                                        5⤵
                                                                          PID:3848
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --disable-databases --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                                                                          5⤵
                                                                            PID:1244
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:8
                                                                            5⤵
                                                                              PID:5540
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,6818339456408714020,5097213905794622158,131072 --disable-features=TranslateUI --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:8
                                                                              5⤵
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:5756
                                                                    • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                      1⤵
                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                      • Checks BIOS information in registry
                                                                      • Executes dropped EXE
                                                                      • Identifies Wine through registry keys
                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1612
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:1772
                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                        1⤵
                                                                          PID:500
                                                                        • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                          1⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5968
                                                                        • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe
                                                                          1⤵
                                                                          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                          • Checks BIOS information in registry
                                                                          • Executes dropped EXE
                                                                          • Identifies Wine through registry keys
                                                                          • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:5448

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\710aa55d-6e17-4909-b994-2624189a25a5.tmp

                                                                          Filesize

                                                                          9KB

                                                                          MD5

                                                                          187e8bd17b07de7d67bd849ab2e2f4bc

                                                                          SHA1

                                                                          5e2cacf6a34be0ecb22851889ec74f201a3eb417

                                                                          SHA256

                                                                          38c8a2deba8a59986abb690269d678e73d504a6a8dd4a9e31e855f140505fbd8

                                                                          SHA512

                                                                          be228d24701cbb8042373dd514ae43d6d776f7dd0701a6cad56fbbdac7cdb101054c4bfcc104018daefd699b2ea2a4dd7c00ad62b174b21a7196650aa0941870

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          fd4df330bdd8da1d432d484698e2e11a

                                                                          SHA1

                                                                          caa89b58b1c1ebd3823d735c2d5268a38b4882b9

                                                                          SHA256

                                                                          5cb0f372a05a378854ae74d275282271ad178735cc38765e68306c4acbab9acc

                                                                          SHA512

                                                                          10b64989dc54cae0e6d1a33fba7f5d7f40984ae6b292f21897c432f786aa8d975b669cefff12821d5bbb43045c2e50427844cfc2c4fc02af5980d7c2778be88b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          4d1cf428ab09cc1afd1b3dded64f79b3

                                                                          SHA1

                                                                          90318c292f395d2ebe8994857234330ad7eee5ee

                                                                          SHA256

                                                                          17640ed4b2de3cff37e2ef278e5e41f61a3e02a1051b904afedfe1ef53450aa8

                                                                          SHA512

                                                                          e9443c232798cbfc59da7d5e6911fcce9a512420669e2db76fd1394cbde0439c6fb3cbef90a05e687e402059acf4bbea1d0fa42850f93511530aec0cb3911d38

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          e5edc74f505fecb5f262308648052ea8

                                                                          SHA1

                                                                          16acdf4b035d7024dd9f7e07e6a57ab41dc76e5f

                                                                          SHA256

                                                                          6201ccb96454d0d525977f28056571314419a3219c8f39b6b585fb0368c868a1

                                                                          SHA512

                                                                          bb8b5bffe9a53a7558466620de9554ed801d9d24904408b8405220a163bcffe707095de0b43a095004cd63e00a34876ac90f6dc3331f8dcc1abf4d2751caac32

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Crashpad\throttle_store.dat

                                                                          Filesize

                                                                          20B

                                                                          MD5

                                                                          9e4e94633b73f4a7680240a0ffd6cd2c

                                                                          SHA1

                                                                          e68e02453ce22736169a56fdb59043d33668368f

                                                                          SHA256

                                                                          41c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304

                                                                          SHA512

                                                                          193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\8c4460c1-7f39-4996-8361-2be5e39857d2.tmp

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          f459add0e1bf4a6e09b2c3219c267a78

                                                                          SHA1

                                                                          570c963442a60e01f9aeefa98c1df15c4ca772fe

                                                                          SHA256

                                                                          c4c1da69ffdb982a9741e6da943b88fcddae47e25601206128f394a7f1fabdbe

                                                                          SHA512

                                                                          b1b75b988ac25aaf4a5e8490e6fb6cb8e3809ddbc48ab6eb953ec3610a6b463feb476cfc243be60f9b3d38f8fe356e2fec832ad1856cd113dba8bd31f8023f24

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Local Storage\leveldb\MANIFEST-000001

                                                                          Filesize

                                                                          41B

                                                                          MD5

                                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                                          SHA1

                                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                          SHA256

                                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                          SHA512

                                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Microsoft Edge.lnk

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          3d3e21756c9b69d0ec7c2f50eb90b85d

                                                                          SHA1

                                                                          4990daa50872a54cf2db6e62ddf8b2da03a5d431

                                                                          SHA256

                                                                          2224c5e0be4d2feed3bb9b8d8127e4d76574c9421bdd4b5ad59008e79c65d9e8

                                                                          SHA512

                                                                          b4ef707c0ca14c0b1db8f0b349d2d138d5339efb5942a1b42647a05dc64a1bea42f1092eb7dc0551ec1f875611dd6458263321e23d128b1e41fe440038d1b346

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          de366ad6c5e232fa726b3c38d3030f80

                                                                          SHA1

                                                                          40aaf8913fab220a65d2f5df562e84ab74747cc3

                                                                          SHA256

                                                                          f09a2e8421c93ae383d9e235d6ffca448bc7be5c0e5ce68e5938fb6d29d2b7ab

                                                                          SHA512

                                                                          c3ab2215b16ab18a48ce02a0e315b310708f30ce9c831db67ad663f90fdacbd9774d07cc81a732685e9b413c9dfa9302a7372521e8b6bc1e73222cddbf6642a3

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Preferences

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          6d23291c0d8876b856ada324fa8b9dbc

                                                                          SHA1

                                                                          f488e46339e5cb616e8e92e5bf1239cd5a3f20c5

                                                                          SHA256

                                                                          41bb21b60344e0f100591a5de659c2c6d9635cb73744fbe8579ab8fc07d3d6eb

                                                                          SHA512

                                                                          944273d55941a920ac4659e7c73e0af520f476bfa10abdf84e8623fd9605097ee02849be692420657421af00b5560e504151f7edf7e88b094cb1ec7359493948

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          c5282daeb47301f5edcd31ffa1c5ad82

                                                                          SHA1

                                                                          b567dc2dc77acc687b6b2cd2095496246c94859d

                                                                          SHA256

                                                                          02d7a900e8ea95d007cea3ca4f3a8f240cdef451692b44129bdcc30516f1c09a

                                                                          SHA512

                                                                          f168286788d4e5ebc7b99a078bbc159b0ba26612a067fd14d11c046a4caf0118bd713e00599eaa5e5d154c469df7a7e66ce4d738447a9363de9baf45d39b9555

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Secure Preferences~RFe58879a.TMP

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          853476782c4bbd9f1684dd3d60f39988

                                                                          SHA1

                                                                          8e488887c0a9e6b934efd3c81fc6996018e358de

                                                                          SHA256

                                                                          943578bdd9503a967ff7475606225acf40456b5e93cb8133f5c0d06e7897284a

                                                                          SHA512

                                                                          2230b7d4260f75c5aaba9f878ae27022e5202702fc2978cda5d7456de78288599101a135056292b16e85230eac440f625f0de6e639dc9628f78eff2fa4f72e66

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Site Characteristics Database\CURRENT

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          46295cac801e5d4857d09837238a6394

                                                                          SHA1

                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                          SHA256

                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                          SHA512

                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_0

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          cf89d16bb9107c631daabf0c0ee58efb

                                                                          SHA1

                                                                          3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                          SHA256

                                                                          d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                          SHA512

                                                                          8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_1

                                                                          Filesize

                                                                          264KB

                                                                          MD5

                                                                          f50f89a0a91564d0b8a211f8921aa7de

                                                                          SHA1

                                                                          112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                          SHA256

                                                                          b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                          SHA512

                                                                          bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_2

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          0962291d6d367570bee5454721c17e11

                                                                          SHA1

                                                                          59d10a893ef321a706a9255176761366115bedcb

                                                                          SHA256

                                                                          ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                          SHA512

                                                                          f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache\data_3

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          41876349cb12d6db992f1309f22df3f0

                                                                          SHA1

                                                                          5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                          SHA256

                                                                          e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                          SHA512

                                                                          e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data Kiosk\Default\data_reduction_proxy_leveldb\CURRENT

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          206702161f94c5cd39fadd03f4014d98

                                                                          SHA1

                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                          SHA256

                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                          SHA512

                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                        • C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe

                                                                          Filesize

                                                                          1.8MB

                                                                          MD5

                                                                          2823c875bca3fe7550bfe5ca70b94ef1

                                                                          SHA1

                                                                          ccf3255d4fbde389c7de5a1acbf782257f354cba

                                                                          SHA256

                                                                          7e5fbac8a474b8082983455af8102f63b20606b6c85287c4fd5766c9cb673b45

                                                                          SHA512

                                                                          04f4e84b03d37b9d0710378848e340819fbb570922bbe3f61a0c677d260b4c2e49bb13491b3703457ffcdcd95b3611118d3f4ff1e57b9eb4dc985f77c0d3b2fb

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000030001\6eeb5954d1.exe

                                                                          Filesize

                                                                          1.7MB

                                                                          MD5

                                                                          d18660c8c25e7f70e188826a4b786a83

                                                                          SHA1

                                                                          5d08e20bdd66e7a67527c2c90baeb5988891fcff

                                                                          SHA256

                                                                          1eadbe273a568d404beb8143a7c3f8e844e153574f3c5d73549812b1c6671c77

                                                                          SHA512

                                                                          58b29370c8304b95bc0bdb24d7fd55f628533501965114e6985f0afa8f85cb936079ccd65952db458031b9639b4e98a029e195faed629488e81370a4eacf2612

                                                                        • C:\Users\Admin\AppData\Local\Temp\1000033001\9933230cad.exe

                                                                          Filesize

                                                                          896KB

                                                                          MD5

                                                                          47537efd2963bb97a5ee2a2cda534e1e

                                                                          SHA1

                                                                          d69a769ab90e5fb58e20cdc8494403ccd3318121

                                                                          SHA256

                                                                          f4b159705bcecae06b1f82d7fb6affeeee237d69cc04c8b8a5d70455808c6f39

                                                                          SHA512

                                                                          b8267a4dcf2d39912d9e42637b5d3d3d8fedbd87ec1c49f04ae8a0d236a0726f74512dba79804d2bd85c551164b797656fff136d714d29a30328c0c702e88f2b

                                                                        • C:\Users\Admin\AppData\Roaming\1000026000\df450c7782.exe

                                                                          Filesize

                                                                          80KB

                                                                          MD5

                                                                          609cdb075bb1b2b4c0a7c7d3eb9d7bfa

                                                                          SHA1

                                                                          617ec4a15705288651be66ed61b72e698c956354

                                                                          SHA256

                                                                          e16e95852786d943dc085cb071ac2dcfc69755da58b263136b7e06d1f5a7ce72

                                                                          SHA512

                                                                          f71b01756ee727e07e4818f1cd15017dd5976f9fd7fa19dc7700d2fd8b3cbf630ed097c6e48e911f707dd8244f7fefe6335214bbca946423c303b97c0a056132

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GIE51HEE30JTA2TGB3XS.temp

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          6eaa0732da2ee6af9a8ff83450882af5

                                                                          SHA1

                                                                          0f515c72f21111e7012e8c23f812e9597e38219a

                                                                          SHA256

                                                                          6eab56ee2eefd0d78c852e1600b2e420cfd1cad36119b7292ab48e32b42f5a9b

                                                                          SHA512

                                                                          d2c3fc260ddd7053ae903d43475dac584567580ee91891de535b33f961af0f70dfd5d7bc3c6348cfbfb838e9436605410bd64655e7bd7f008fc532fe9371bdb2

                                                                        • memory/1584-3-0x0000000000840000-0x0000000000CFF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1584-1-0x0000000077364000-0x0000000077366000-memory.dmp

                                                                          Filesize

                                                                          8KB

                                                                        • memory/1584-2-0x0000000000841000-0x000000000086F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/1584-4-0x0000000000840000-0x0000000000CFF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1584-17-0x0000000000840000-0x0000000000CFF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1584-0-0x0000000000840000-0x0000000000CFF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1612-29-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1612-25-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1612-30-0x0000000000B31000-0x0000000000B5F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/1612-27-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/1612-26-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-275-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-22-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-19-0x0000000000B31000-0x0000000000B5F000-memory.dmp

                                                                          Filesize

                                                                          184KB

                                                                        • memory/3228-21-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-18-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-23-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-32-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-35-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-420-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-419-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-31-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-397-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-33-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-70-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-36-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-20-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-34-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-356-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-37-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-375-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-376-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-377-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/3228-387-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/4420-67-0x0000000000C60000-0x00000000012DB000-memory.dmp

                                                                          Filesize

                                                                          6.5MB

                                                                        • memory/4420-69-0x0000000000C60000-0x00000000012DB000-memory.dmp

                                                                          Filesize

                                                                          6.5MB

                                                                        • memory/5448-399-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/5448-400-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/5968-279-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB

                                                                        • memory/5968-277-0x0000000000B30000-0x0000000000FEF000-memory.dmp

                                                                          Filesize

                                                                          4.7MB