Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 19:50

General

  • Target

    febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd.exe

  • Size

    3.1MB

  • MD5

    0a25084685b54b88100d89d2bf1fb4de

  • SHA1

    5a67610f98d718816fc87ddb0c07bec46e0fd272

  • SHA256

    febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd

  • SHA512

    d9dd3e961b48ef0989d65d73b4726e15f5773d4075527a1fdc7e4a8a1bd94a0bb8317dfe039f15d0e97642e78d0388bfc19a25098d416a2e1856ce522db5a2d1

  • SSDEEP

    49152:Vy/iRjA6Y2rjUl0ly9hL/qapGabr99KnYmcdRW/So5x:Vy/Kcv2rIl0l0hkq+Y/vqx

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd.exe
    "C:\Users\Admin\AppData\Local\Temp\febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3100
      • C:\Users\Admin\AppData\Local\Temp\1005956001\548362cad5.exe
        "C:\Users\Admin\AppData\Local\Temp\1005956001\548362cad5.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4728
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:1844
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0x44,0x104,0x7ffded14cc40,0x7ffded14cc4c,0x7ffded14cc58
            5⤵
              PID:1892
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1876 /prefetch:2
              5⤵
                PID:5252
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2044,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2112 /prefetch:3
                5⤵
                  PID:5276
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2244,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2588 /prefetch:8
                  5⤵
                    PID:5332
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5504
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5524
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4536,i,9166160270301170449,6174067227874014933,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5824
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3236
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:2600
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 1768
                  4⤵
                  • Program crash
                  PID:2428
              • C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe
                "C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe"
                3⤵
                • Executes dropped EXE
                PID:4544
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tqcb.lnk'); $s.TargetPath = 'C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe'; $s.Save()"
                  4⤵
                  • Drops startup file
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:6084
              • C:\Users\Admin\AppData\Local\Temp\1006039001\708bab6c25.exe
                "C:\Users\Admin\AppData\Local\Temp\1006039001\708bab6c25.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:228
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=708bab6c25.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                  4⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:5004
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0xe0,0x7ffdee7d46f8,0x7ffdee7d4708,0x7ffdee7d4718
                    5⤵
                      PID:2108
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                      5⤵
                        PID:4872
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:3
                        5⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4696
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:8
                        5⤵
                          PID:1708
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:1
                          5⤵
                            PID:2436
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                            5⤵
                              PID:3328
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                              5⤵
                                PID:5740
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:1
                                5⤵
                                  PID:5976
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:1
                                  5⤵
                                    PID:4036
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8
                                    5⤵
                                      PID:5448
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5988
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:1
                                      5⤵
                                        PID:6024
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                                        5⤵
                                          PID:6036
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                          5⤵
                                            PID:1048
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13974234602279338721,1206959696637213647,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                                            5⤵
                                              PID:1192
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=708bab6c25.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.0
                                            4⤵
                                              PID:5176
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdee7d46f8,0x7ffdee7d4708,0x7ffdee7d4718
                                                5⤵
                                                  PID:5496
                                            • C:\Users\Admin\AppData\Local\Temp\1006040001\6c23bf94eb.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1006040001\6c23bf94eb.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:1704
                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                              "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
                                              3⤵
                                                PID:716
                                              • C:\Users\Admin\AppData\Local\Temp\1006042001\5fafc81ecf.exe
                                                "C:\Users\Admin\AppData\Local\Temp\1006042001\5fafc81ecf.exe"
                                                3⤵
                                                • Modifies Windows Defender Real-time Protection settings
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Windows security modification
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2756
                                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                            1⤵
                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                            • Checks BIOS information in registry
                                            • Executes dropped EXE
                                            • Identifies Wine through registry keys
                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2180
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:3652
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:3440
                                              • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                1⤵
                                                  PID:5668
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4728 -ip 4728
                                                  1⤵
                                                    PID:4896
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4700
                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:5724
                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                                                    1⤵
                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                    • Checks BIOS information in registry
                                                    • Executes dropped EXE
                                                    • Identifies Wine through registry keys
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4072
                                                  • C:\Users\Admin\AppData\Local\Temp\service123.exe
                                                    C:\Users\Admin\AppData\Local\Temp\/service123.exe
                                                    1⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    PID:4496

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                    Filesize

                                                    2B

                                                    MD5

                                                    d751713988987e9331980363e24189ce

                                                    SHA1

                                                    97d170e1550eee4afc0af065b78cda302a97674c

                                                    SHA256

                                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                    SHA512

                                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    61cef8e38cd95bf003f5fdd1dc37dae1

                                                    SHA1

                                                    11f2f79ecb349344c143eea9a0fed41891a3467f

                                                    SHA256

                                                    ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e

                                                    SHA512

                                                    6fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    0a9dc42e4013fc47438e96d24beb8eff

                                                    SHA1

                                                    806ab26d7eae031a58484188a7eb1adab06457fc

                                                    SHA256

                                                    58d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151

                                                    SHA512

                                                    868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    264B

                                                    MD5

                                                    6a93b0d4fa9134b9432360134527b53a

                                                    SHA1

                                                    147d4677ac1c39df2c31f258e109fd420b11e4ed

                                                    SHA256

                                                    02825e390bb1859a64dd8e117ab93589d5c91344245260018f91ed8544997d05

                                                    SHA512

                                                    c6413f852f9384676cb71bff71ec4f60fb75559ee2d4c945a99fec79bf243330f4efed39db033b23b75567730b7d0387ab3e5c3eab75d9033fab9e2b4ecf6ab4

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    437B

                                                    MD5

                                                    05592d6b429a6209d372dba7629ce97c

                                                    SHA1

                                                    b4d45e956e3ec9651d4e1e045b887c7ccbdde326

                                                    SHA256

                                                    3aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd

                                                    SHA512

                                                    caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    0c3a429bda319f3bfa0ca4a1032ccd31

                                                    SHA1

                                                    7cdd886d0204cc0b6b9157b0cc5d835f70c98685

                                                    SHA256

                                                    df8eca6787cca123532c0c0682218fcebead05926b41775c79af1cfdfc9cf5a4

                                                    SHA512

                                                    a41952af7b197fcc4adca8929eda1fbc4ffab1abf63407001d18044c3d881fd7dc631992236fa7b54e015c6e5e93422ce2fcea391c80126c58098786b5c628db

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    b118c6f5cca9fe2c78c2cf66cf34bc57

                                                    SHA1

                                                    aca37989cad827c546932cd9a72944d5d68488e1

                                                    SHA256

                                                    b5684b3a135bfba30f2a46f7f75b09a824c02bf9cb51c18173dc2913873ea7a8

                                                    SHA512

                                                    f4c7370220db4477aed0e0bda00322da213975f81337599d23fcaffb925e83e83b295a8c3c9110a0de46b2e3228bd02c136a118e16e5b6f02da73cf5027303a7

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    429bb335369673e53e5649315c07f226

                                                    SHA1

                                                    45dea7c02b5d9e60a2cb3d61bc577eb282f6761a

                                                    SHA256

                                                    6b5197948d4256aeb8c56edea08d65d3ee7d9afa19a7e171be1fd561e4f9c13e

                                                    SHA512

                                                    0b1c0f2aeff231e49dc3c544e948f3eece3c229c41f009f28258d5bf36df7eb92faa8f8fb98a8d857137747bb3f7eb394f5e4d4da5ac417cb3f4620ab6f69513

                                                  • C:\Users\Admin\AppData\Local\Temp\1005956001\548362cad5.exe

                                                    Filesize

                                                    4.2MB

                                                    MD5

                                                    77eb79a7af5d8cdd242f7f9dba533963

                                                    SHA1

                                                    f89c650c1587dc8f983f9639536c4ef00032b6de

                                                    SHA256

                                                    650d696c30ec972a17a803a58db66bf671628124eedfd06101224958d47e4808

                                                    SHA512

                                                    c77e7f2c740321b4b079e984e7df1f3968f487d7d01efee875b82af378f0da9f80601198b8a7dd7fd6c3ae4ea8591a03202d10ade319e97ae15d214799c3ae02

                                                  • C:\Users\Admin\AppData\Local\Temp\1006034001\mk.exe

                                                    Filesize

                                                    8.9MB

                                                    MD5

                                                    b56761ad16c0e1cdd4765a130123dbc2

                                                    SHA1

                                                    fc50b4fd56335d85bbaaf2d6f998aad037428009

                                                    SHA256

                                                    095a2046d9a3aeeefc290dc43793f58ba6ab884a30d1743d04c9b5423234ccdd

                                                    SHA512

                                                    26c82da68d7eef66c15e8ae0663d29c81b00691580718c63cdb05097ae953cbe0e6ac35b654e883db735808640bc82141da54c8773af627a5eaea70b0acf77ed

                                                  • C:\Users\Admin\AppData\Local\Temp\1006039001\708bab6c25.exe

                                                    Filesize

                                                    3.0MB

                                                    MD5

                                                    2eb7dd5fc174ea7ce691ba15a1e34ba4

                                                    SHA1

                                                    4287676addcd538c2f5f975b6f2a9e8a415f2b37

                                                    SHA256

                                                    6094e39d84c42971e1efba0875fa34052dc3d2cd24f8b884b383aaaf32fe3cec

                                                    SHA512

                                                    b98cde63c0678552966025db56a15cf211d8d79513bd9a928bfee11909490aba53ceb1135cf88647196e079430bbd878828091840ebf822251f01f4c776a4e4a

                                                  • C:\Users\Admin\AppData\Local\Temp\1006040001\6c23bf94eb.exe

                                                    Filesize

                                                    1.7MB

                                                    MD5

                                                    f8d1d73a4b017ae508ee5172f7601906

                                                    SHA1

                                                    6feb8b7fa058b1f818ea2b2485b8435d87b218c6

                                                    SHA256

                                                    4688b875a5efc11c995747658f96f517bf06631e4ab4a1c05d0718abdc33e5fe

                                                    SHA512

                                                    1365b7dda13edae170c5022828edcfd708f5378d8fc83ba07433a2094e7137c1fdf47e18bf387d481ae2610b3ce13eacd8e6e9fcb63b4423f39536c4bd631e7a

                                                  • C:\Users\Admin\AppData\Local\Temp\1006042001\5fafc81ecf.exe

                                                    Filesize

                                                    2.7MB

                                                    MD5

                                                    39307db79b786d76d1b6070fec77bc0b

                                                    SHA1

                                                    54546d19873479cff3fc1ba00a77c9433612c8d6

                                                    SHA256

                                                    c6051a76f472b570bf9eb2a80faa638d370e415f0c7904ba4c4c044d673db69b

                                                    SHA512

                                                    0da1eee41b9dd08c85f8809427e30bff86da2f811f5be29d0aefb951b377408b0a4899b25efd6d9f24d3c69be193a8adc465d18590d6f81a8df865fc68a75125

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qb3bwny1.sph.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                                    Filesize

                                                    3.1MB

                                                    MD5

                                                    0a25084685b54b88100d89d2bf1fb4de

                                                    SHA1

                                                    5a67610f98d718816fc87ddb0c07bec46e0fd272

                                                    SHA256

                                                    febbb41378c5839064c6449c9b827d5f86cd5d3d162798e30a365c50f217a1fd

                                                    SHA512

                                                    d9dd3e961b48ef0989d65d73b4726e15f5773d4075527a1fdc7e4a8a1bd94a0bb8317dfe039f15d0e97642e78d0388bfc19a25098d416a2e1856ce522db5a2d1

                                                  • memory/228-128-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-132-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-126-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-131-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-137-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-153-0x00000000001F0000-0x00000000004FC000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/228-124-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-125-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-269-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-127-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-83-0x00000000001F0000-0x00000000004FC000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/228-133-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-129-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-297-0x00000000001F0000-0x00000000004FC000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/228-134-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-135-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-136-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-130-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-138-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-154-0x00000000001F0000-0x00000000004FC000-memory.dmp

                                                    Filesize

                                                    3.0MB

                                                  • memory/228-117-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-118-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-144-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-147-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-146-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-145-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-143-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-142-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-151-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-150-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-149-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-148-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-141-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-140-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/228-139-0x00000000060E0000-0x000000000639A000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/1704-110-0x0000000000FE0000-0x000000000166F000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/1704-109-0x0000000000FE0000-0x000000000166F000-memory.dmp

                                                    Filesize

                                                    6.6MB

                                                  • memory/2180-115-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2180-113-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2756-174-0x0000000000BF0000-0x0000000000EAA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2756-173-0x0000000000BF0000-0x0000000000EAA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2756-336-0x0000000000BF0000-0x0000000000EAA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2756-333-0x0000000000BF0000-0x0000000000EAA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2756-175-0x0000000000BF0000-0x0000000000EAA000-memory.dmp

                                                    Filesize

                                                    2.7MB

                                                  • memory/2920-1-0x00000000777B4000-0x00000000777B6000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/2920-2-0x0000000000C01000-0x0000000000C69000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/2920-3-0x0000000000C00000-0x0000000000F24000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2920-4-0x0000000000C00000-0x0000000000F24000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2920-18-0x0000000000C01000-0x0000000000C69000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/2920-17-0x0000000000C00000-0x0000000000F24000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/2920-0-0x0000000000C00000-0x0000000000F24000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-19-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-38-0x0000000000681000-0x00000000006E9000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/3100-46-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-152-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-42-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-20-0x0000000000681000-0x00000000006E9000-memory.dmp

                                                    Filesize

                                                    416KB

                                                  • memory/3100-39-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-84-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-23-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-22-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/3100-21-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4072-505-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4072-507-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4544-112-0x0000000000400000-0x0000000000CF2000-memory.dmp

                                                    Filesize

                                                    8.9MB

                                                  • memory/4700-445-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4700-443-0x0000000000680000-0x00000000009A4000-memory.dmp

                                                    Filesize

                                                    3.1MB

                                                  • memory/4728-45-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-66-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-82-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-116-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-417-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-85-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                                                    Filesize

                                                    10.4MB

                                                  • memory/4728-65-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-264-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-44-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/4728-43-0x0000000000831000-0x0000000000AA8000-memory.dmp

                                                    Filesize

                                                    2.5MB

                                                  • memory/4728-40-0x0000000000830000-0x00000000013D6000-memory.dmp

                                                    Filesize

                                                    11.6MB

                                                  • memory/6084-377-0x000002B8F3790000-0x000002B8F37B2000-memory.dmp

                                                    Filesize

                                                    136KB