Analysis

  • max time kernel
    284s
  • max time network
    315s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 15:58

General

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

smokeloader

Version

2020

C2

http://naritouzina.net/

http://nukaraguasleep.net/

http://notfortuaj.net/

http://natuturalistic.net/

http://zaniolofusa.net/

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

NEW_YEAR_BTC

C2

86.105.252.12:35200

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • PlugX

    PlugX is a RAT (Remote Access Trojan) that has been around since 2008.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 2 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Nirsoft 8 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 34 IoCs
  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 20 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 15 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe
    "C:\Users\Admin\AppData\Local\Temp\Treasure.Vault.3D.Screensaver.keygen.by.Paradox.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\intro.exe
        intro.exe 1O5ZF
        3⤵
        • Executes dropped EXE
        PID:2068
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
        keygen-pr.exe -p83fsase3Ge
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2064
          • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
            C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe -txt -scanlocal -file:potato.dat
            5⤵
              PID:1572
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
          keygen-step-1.exe
          3⤵
          • Executes dropped EXE
          PID:3132
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
          keygen-step-3.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3928
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:3040
            • C:\Windows\SysWOW64\PING.EXE
              ping 1.1.1.1 -n 1 -w 3000
              5⤵
              • Runs ping.exe
              PID:2096
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
          keygen-step-4.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2076
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\002.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\002.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:700
          • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
            "C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3884
            • C:\Users\Admin\AppData\Local\Temp\sib826D.tmp\0\setup.exe
              "C:\Users\Admin\AppData\Local\Temp\sib826D.tmp\0\setup.exe" -s
              5⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2280
              • C:\Program Files (x86)\fjkw1lb5cxpb\aliens.exe
                "C:\Program Files (x86)\fjkw1lb5cxpb\aliens.exe"
                6⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Writes to the Master Boot Record (MBR)
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Modifies system certificate store
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2944
                • C:\Windows\SysWOW64\msiexec.exe
                  msiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"
                  7⤵
                  • Enumerates connected drives
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:1124
                • C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe
                  C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe 0011 installp1
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks whether UAC is enabled
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of SetThreadContext
                  • Checks SCSI registry key(s)
                  • Suspicious use of SetWindowsHookEx
                  PID:2328
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2840
                  • C:\Users\Admin\AppData\Roaming\1605715653158.exe
                    "C:\Users\Admin\AppData\Roaming\1605715653158.exe" /sjson "C:\Users\Admin\AppData\Roaming\1605715653158.txt"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:1396
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:3276
                  • C:\Users\Admin\AppData\Roaming\1605715657408.exe
                    "C:\Users\Admin\AppData\Roaming\1605715657408.exe" /sjson "C:\Users\Admin\AppData\Roaming\1605715657408.txt"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:3488
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:564
                  • C:\Users\Admin\AppData\Roaming\1605715663049.exe
                    "C:\Users\Admin\AppData\Roaming\1605715663049.exe" /sjson "C:\Users\Admin\AppData\Roaming\1605715663049.txt"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:1268
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe"
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:992
                  • C:\Users\Admin\AppData\Roaming\1605715665799.exe
                    "C:\Users\Admin\AppData\Roaming\1605715665799.exe" /sjson "C:\Users\Admin\AppData\Roaming\1605715665799.txt"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of SetWindowsHookEx
                    PID:2860
                  • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                    C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe ThunderFW "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2552
                  • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                    "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Writes to the Master Boot Record (MBR)
                    • Suspicious use of SetWindowsHookEx
                    PID:3336
                  • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                    "C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe" -StartTP
                    8⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Writes to the Master Boot Record (MBR)
                    • Suspicious use of SetWindowsHookEx
                    PID:2968
                  • C:\Users\Admin\AppData\Local\Temp\1021C014A4C9A552.exe
                    C:\Users\Admin\AppData\Local\Temp\1021C014A4C9A552.exe /silent
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2072
                    • C:\Users\Admin\AppData\Local\Temp\is-TQGP2.tmp\1021C014A4C9A552.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-TQGP2.tmp\1021C014A4C9A552.tmp" /SL5="$90038,761193,121344,C:\Users\Admin\AppData\Local\Temp\1021C014A4C9A552.exe" /silent
                      9⤵
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SetWindowsHookEx
                      PID:2480
                      • C:\Program Files (x86)\RearRips\seed.sfx.exe
                        "C:\Program Files (x86)\RearRips\seed.sfx.exe" -pK2j8l614 -s1
                        10⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Suspicious use of SetWindowsHookEx
                        PID:3568
                        • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                          "C:\Program Files (x86)\Seed Trade\Seed\seed.exe"
                          11⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          PID:2464
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd.exe" /c "start https://iplogger.org/14Ahe7"
                        10⤵
                        • Checks computer location settings
                        PID:3352
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe"
                    8⤵
                      PID:912
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 3
                        9⤵
                        • Runs ping.exe
                        PID:3584
                  • C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe
                    C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe 200 installp1
                    7⤵
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Writes to the Master Boot Record (MBR)
                    • Checks SCSI registry key(s)
                    • Suspicious use of SetWindowsHookEx
                    PID:4040
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c taskkill /f /im chrome.exe
                      8⤵
                        PID:2836
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /f /im chrome.exe
                          9⤵
                          • Kills process with taskkill
                          PID:3172
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe"
                        8⤵
                          PID:3056
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 3
                            9⤵
                            • Runs ping.exe
                            PID:2560
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd /c ping 127.0.0.1 -n 3 & del "C:\Program Files (x86)\fjkw1lb5cxpb\aliens.exe"
                        7⤵
                          PID:1736
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 3
                            8⤵
                            • Runs ping.exe
                            PID:1220
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg2_2qua.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg2_2qua.exe"
                    4⤵
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2116
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall21.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall21.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:1272
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c taskkill /f /im chrome.exe
                      5⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2156
                      • C:\Windows\SysWOW64\taskkill.exe
                        taskkill /f /im chrome.exe
                        6⤵
                        • Kills process with taskkill
                        PID:560
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\hjjgaa.exe
                    "C:\Users\Admin\AppData\Local\Temp\RarSFX2\hjjgaa.exe"
                    4⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    PID:2908
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      PID:3924
                    • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                      C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe /scookiestxt C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      5⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1308
            • C:\Windows\system32\msiexec.exe
              C:\Windows\system32\msiexec.exe /V
              1⤵
              • Enumerates connected drives
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1016
              • C:\Windows\syswow64\MsiExec.exe
                C:\Windows\syswow64\MsiExec.exe -Embedding 250E69250CC581C0E4EB0CB8AD8E9B0C C
                2⤵
                • Loads dropped DLL
                PID:2624
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
              1⤵
              • Drops file in Windows directory
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:304
            • C:\Windows\system32\browser_broker.exe
              C:\Windows\system32\browser_broker.exe -Embedding
              1⤵
              • Modifies Internet Explorer settings
              PID:1692
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Modifies registry class
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetWindowsHookEx
              PID:3540
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Modifies Internet Explorer settings
              • Modifies registry class
              PID:4120
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Modifies registry class
              PID:4388
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Modifies registry class
              PID:4548
            • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
              "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
              1⤵
              • Modifies registry class
              PID:4640
            • C:\Users\Admin\AppData\Local\Temp\D5F0.exe
              C:\Users\Admin\AppData\Local\Temp\D5F0.exe
              1⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Modifies system certificate store
              PID:4904
              • C:\Windows\SysWOW64\icacls.exe
                icacls "C:\Users\Admin\AppData\Local\e53c72c0-0784-423a-8049-005ad90d254b" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                2⤵
                • Modifies file permissions
                PID:412
            • C:\Users\Admin\AppData\Local\Temp\D814.exe
              C:\Users\Admin\AppData\Local\Temp\D814.exe
              1⤵
              • Executes dropped EXE
              PID:4924
            • C:\Users\Admin\AppData\Local\Temp\DCF7.exe
              C:\Users\Admin\AppData\Local\Temp\DCF7.exe
              1⤵
              • Executes dropped EXE
              PID:4952
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\llvmbdxh\
                2⤵
                  PID:640
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\clfkcbws.exe" C:\Windows\SysWOW64\llvmbdxh\
                  2⤵
                    PID:2920
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" create llvmbdxh binPath= "C:\Windows\SysWOW64\llvmbdxh\clfkcbws.exe /d\"C:\Users\Admin\AppData\Local\Temp\DCF7.exe\"" type= own start= auto DisplayName= "wifi support"
                    2⤵
                      PID:4888
                  • C:\Users\Admin\AppData\Local\Temp\E053.exe
                    C:\Users\Admin\AppData\Local\Temp\E053.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4980
                  • C:\Users\Admin\AppData\Local\Temp\EBDD.exe
                    C:\Users\Admin\AppData\Local\Temp\EBDD.exe
                    1⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:5040
                  • C:\Users\Admin\AppData\Local\Temp\F4B8.exe
                    C:\Users\Admin\AppData\Local\Temp\F4B8.exe
                    1⤵
                    • Executes dropped EXE
                    PID:4216

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  New Service

                  1
                  T1050

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Bootkit

                  1
                  T1067

                  Privilege Escalation

                  New Service

                  1
                  T1050

                  Defense Evasion

                  File Permissions Modification

                  1
                  T1222

                  Modify Registry

                  3
                  T1112

                  Install Root Certificate

                  1
                  T1130

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  4
                  T1012

                  System Information Discovery

                  5
                  T1082

                  Peripheral Device Discovery

                  2
                  T1120

                  Remote System Discovery

                  1
                  T1018

                  Collection

                  Data from Local System

                  1
                  T1005

                  Command and Control

                  Web Service

                  1
                  T1102

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\RearRips\seed.sfx.exe
                  • C:\Program Files (x86)\RearRips\seed.sfx.exe
                  • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                  • C:\Program Files (x86)\Seed Trade\Seed\seed.exe
                  • C:\Program Files (x86)\fjkw1lb5cxpb\aliens.exe
                  • C:\Program Files (x86)\fjkw1lb5cxpb\aliens.exe
                  • C:\ProgramData\Thunder Network\DownloadLib\pub_store.dat
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1FC0448E6D3D5712272FAF5B90A70C5E
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1FC0448E6D3D5712272FAF5B90A70C5E
                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\5.exe
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\5.exe
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\updatewin1.exe
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\updatewin1.exe
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\updatewin2.exe
                  • C:\Users\Admin\AppData\Local\1797f104-535e-4a56-83db-47c5e7d9c675\updatewin2.exe
                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B31TQABN.cookie
                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\InetCookies\L0S4875T.cookie
                  • C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe
                  • C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe
                  • C:\Users\Admin\AppData\Local\Temp\0B44010BDDEFEFD3.exe
                  • C:\Users\Admin\AppData\Local\Temp\1021C014A4C9A552.exe
                  • C:\Users\Admin\AppData\Local\Temp\1105.tmp
                  • C:\Users\Admin\AppData\Local\Temp\D5F0.exe
                  • C:\Users\Admin\AppData\Local\Temp\D5F0.exe
                  • C:\Users\Admin\AppData\Local\Temp\D5F0.exe
                  • C:\Users\Admin\AppData\Local\Temp\D814.exe
                  • C:\Users\Admin\AppData\Local\Temp\D814.exe
                  • C:\Users\Admin\AppData\Local\Temp\DCF7.exe
                  • C:\Users\Admin\AppData\Local\Temp\DCF7.exe
                  • C:\Users\Admin\AppData\Local\Temp\E053.exe
                  • C:\Users\Admin\AppData\Local\Temp\E053.exe
                  • C:\Users\Admin\AppData\Local\Temp\EBDD.exe
                  • C:\Users\Admin\AppData\Local\Temp\EBDD.exe
                  • C:\Users\Admin\AppData\Local\Temp\F4B8.exe
                  • C:\Users\Admin\AppData\Local\Temp\F4B8.exe
                  • C:\Users\Admin\AppData\Local\Temp\FC4A.exe
                  • C:\Users\Admin\AppData\Local\Temp\FC4A.exe
                  • C:\Users\Admin\AppData\Local\Temp\MSIB5EE.tmp
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\intro.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\intro.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-1.exe
                    MD5

                    c615d0bfa727f494fee9ecb3f0acf563

                    SHA1

                    6c3509ae64abc299a7afa13552c4fe430071f087

                    SHA256

                    95d91febc45d03c1ee477c127bcbd332cd6fbce1e91105004af723594e6f0199

                    SHA512

                    d97256eb93d8e546f5fb5c61bebe61e7dfab316eb7685be83782bd36b28df3f80880e7b823197a4b6bae1af7b9460c4c81357dd44ed199ab93ccaee5acc10e51

                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen.bat
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\JOzWR.dat
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\key.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\002.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\002.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\Setup.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall21.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\askinstall21.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\hjjgaa.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\hjjgaa.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg2_2qua.exe
                  • C:\Users\Admin\AppData\Local\Temp\RarSFX2\jg2_2qua.exe
                  • C:\Users\Admin\AppData\Local\Temp\clfkcbws.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\ATL71.DLL
                  • C:\Users\Admin\AppData\Local\Temp\download\MSVCP71.dll
                  • C:\Users\Admin\AppData\Local\Temp\download\MSVCR71.dll
                  • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\MiniThunderPlatform.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\ThunderFW.exe
                  • C:\Users\Admin\AppData\Local\Temp\download\dl_peer_id.dll
                  • C:\Users\Admin\AppData\Local\Temp\download\download_engine.dll
                  • C:\Users\Admin\AppData\Local\Temp\download\zlib1.dll
                  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                  • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                  • C:\Users\Admin\AppData\Local\Temp\gdiview.msi
                    MD5

                    7cc103f6fd70c6f3a2d2b9fca0438182

                    SHA1

                    699bd8924a27516b405ea9a686604b53b4e23372

                    SHA256

                    dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1

                    SHA512

                    92ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128

                  • C:\Users\Admin\AppData\Local\Temp\is-TQGP2.tmp\1021C014A4C9A552.tmp
                  • C:\Users\Admin\AppData\Local\Temp\is-TQGP2.tmp\1021C014A4C9A552.tmp
                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    MD5

                    a6279ec92ff948760ce53bba817d6a77

                    SHA1

                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                    SHA256

                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                    SHA512

                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    MD5

                    a6279ec92ff948760ce53bba817d6a77

                    SHA1

                    5345505e12f9e4c6d569a226d50e71b5a572dce2

                    SHA256

                    8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                    SHA512

                    213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    MD5

                    7fee8223d6e4f82d6cd115a28f0b6d58

                    SHA1

                    1b89c25f25253df23426bd9ff6c9208f1202f58b

                    SHA256

                    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                    SHA512

                    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                  • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                    MD5

                    7fee8223d6e4f82d6cd115a28f0b6d58

                    SHA1

                    1b89c25f25253df23426bd9ff6c9208f1202f58b

                    SHA256

                    a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                    SHA512

                    3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                  • C:\Users\Admin\AppData\Local\Temp\sib826D.tmp\0\setup.exe
                  • C:\Users\Admin\AppData\Local\Temp\sib826D.tmp\0\setup.exe
                  • C:\Users\Admin\AppData\Local\e53c72c0-0784-423a-8049-005ad90d254b\D5F0.exe
                  • C:\Users\Admin\AppData\Roaming\1605715653158.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715653158.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715653158.txt
                  • C:\Users\Admin\AppData\Roaming\1605715657408.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715657408.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715657408.txt
                  • C:\Users\Admin\AppData\Roaming\1605715663049.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715663049.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715663049.txt
                  • C:\Users\Admin\AppData\Roaming\1605715665799.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715665799.exe
                    MD5

                    ef6f72358cb02551caebe720fbc55f95

                    SHA1

                    b5ee276e8d479c270eceb497606bd44ee09ff4b8

                    SHA256

                    6562bdcbf775e04d8238c2b52a4e8df5afa1e35d1d33d1e4508cfe040676c1e5

                    SHA512

                    ea3f0cf40ed3aa3e43b7a19ed6412027f76f9d2d738e040e6459415aa1e5ef13c29ca830a66430c33e492558f7c5f0cc86e1df9474322f231f8506e49c3a1a90

                  • C:\Users\Admin\AppData\Roaming\1605715665799.txt
                  • C:\Users\Admin\AppData\Roaming\gsbjire
                  • C:\Users\Admin\AppData\Roaming\gsbjire
                  • C:\Users\Public\Thunder Network\Mini_downloadlib\ODAwMDAwNTU=\Version_3_2_1_42\Profiles\error.dat
                  • C:\Windows\SysWOW64\llvmbdxh\clfkcbws.exe
                  • \ProgramData\mozglue.dll
                  • \ProgramData\nss3.dll
                  • \Users\Admin\AppData\Local\Temp\1105.tmp
                  • \Users\Admin\AppData\Local\Temp\CC4F.tmp
                  • \Users\Admin\AppData\Local\Temp\MSIB5EE.tmp
                  • \Users\Admin\AppData\Local\Temp\download\atl71.dll
                  • \Users\Admin\AppData\Local\Temp\download\atl71.dll
                  • \Users\Admin\AppData\Local\Temp\download\dl_peer_id.dll
                  • \Users\Admin\AppData\Local\Temp\download\dl_peer_id.dll
                  • \Users\Admin\AppData\Local\Temp\download\dl_peer_id.dll
                  • \Users\Admin\AppData\Local\Temp\download\download_engine.dll
                  • \Users\Admin\AppData\Local\Temp\download\download_engine.dll
                  • \Users\Admin\AppData\Local\Temp\download\msvcp71.dll
                  • \Users\Admin\AppData\Local\Temp\download\msvcp71.dll
                  • \Users\Admin\AppData\Local\Temp\download\msvcr71.dll
                  • \Users\Admin\AppData\Local\Temp\download\msvcr71.dll
                  • \Users\Admin\AppData\Local\Temp\download\zlib1.dll
                  • \Users\Admin\AppData\Local\Temp\download\zlib1.dll
                  • \Users\Admin\AppData\Local\Temp\nsp8162.tmp\Sibuia.dll
                  • \Users\Admin\AppData\Local\Temp\sib826D.tmp\SibClr.dll
                  • \Users\Admin\AppData\Local\Temp\sib826D.tmp\SibClr.dll
                  • \Users\Admin\AppData\Local\Temp\xldl.dll
                  • \Users\Admin\AppData\Local\Temp\xldl.dll
                  • memory/412-216-0x0000000000000000-mapping.dmp
                  • memory/560-78-0x0000000000000000-mapping.dmp
                  • memory/564-117-0x00007FF8F09C0000-0x00007FF8F0A3E000-memory.dmp
                    Filesize

                    504KB

                  • memory/564-116-0x00007FF6CDE48270-mapping.dmp
                  • memory/640-215-0x0000000000000000-mapping.dmp
                  • memory/700-29-0x0000000000000000-mapping.dmp
                  • memory/700-32-0x0000000010000000-0x00000000100E4000-memory.dmp
                    Filesize

                    912KB

                  • memory/912-179-0x0000000000000000-mapping.dmp
                  • memory/968-279-0x0000000000000000-mapping.dmp
                  • memory/968-283-0x00000000021F0000-0x00000000021F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/992-128-0x00007FF8F09C0000-0x00007FF8F0A3E000-memory.dmp
                    Filesize

                    504KB

                  • memory/992-127-0x00007FF6CDE48270-mapping.dmp
                  • memory/1124-58-0x0000000000000000-mapping.dmp
                  • memory/1160-275-0x00000000022B0000-0x00000000022B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1160-272-0x0000000000000000-mapping.dmp
                  • memory/1220-82-0x0000000000000000-mapping.dmp
                  • memory/1268-118-0x0000000000000000-mapping.dmp
                  • memory/1268-122-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/1272-63-0x0000000000000000-mapping.dmp
                  • memory/1284-315-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-313-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-300-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-301-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-303-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-289-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-291-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-304-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-305-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-306-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-307-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-308-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-292-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-309-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-293-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-310-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-311-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-312-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-284-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-298-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-314-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-297-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-316-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-317-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-296-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-318-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-294-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-285-0x0000000005290000-0x0000000005291000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-286-0x0000000005290000-0x0000000005291000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-319-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-299-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-290-0x0000000005380000-0x0000000005381000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-295-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1284-302-0x0000000003190000-0x0000000003191000-memory.dmp
                    Filesize

                    4KB

                  • memory/1308-124-0x0000000000000000-mapping.dmp
                  • memory/1396-104-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/1396-101-0x0000000000000000-mapping.dmp
                  • memory/1456-1-0x0000000000000000-mapping.dmp
                  • memory/1704-255-0x0000000003970000-0x0000000003971000-memory.dmp
                    Filesize

                    4KB

                  • memory/1736-79-0x0000000000000000-mapping.dmp
                  • memory/1768-8-0x0000000000000000-mapping.dmp
                  • memory/1768-7-0x0000000000000000-mapping.dmp
                  • memory/2064-23-0x0000000000000000-mapping.dmp
                  • memory/2068-3-0x0000000000000000-mapping.dmp
                  • memory/2068-4-0x0000000000000000-mapping.dmp
                  • memory/2072-172-0x0000000000000000-mapping.dmp
                  • memory/2072-174-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2076-21-0x0000000000000000-mapping.dmp
                  • memory/2076-20-0x0000000000000000-mapping.dmp
                  • memory/2096-28-0x0000000000000000-mapping.dmp
                  • memory/2116-54-0x0000000000000000-mapping.dmp
                  • memory/2156-73-0x0000000000000000-mapping.dmp
                  • memory/2280-46-0x0000000000000000-mapping.dmp
                  • memory/2280-49-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2328-86-0x00000000039B0000-0x0000000003E61000-memory.dmp
                    Filesize

                    4.7MB

                  • memory/2328-70-0x0000000000000000-mapping.dmp
                  • memory/2328-141-0x00000000064C0000-0x00000000064C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2328-75-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2352-271-0x0000000002D50000-0x0000000002D66000-memory.dmp
                    Filesize

                    88KB

                  • memory/2352-192-0x0000000000B00000-0x0000000000B16000-memory.dmp
                    Filesize

                    88KB

                  • memory/2464-186-0x0000000000000000-mapping.dmp
                  • memory/2464-189-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2464-190-0x0000000000900000-0x0000000000901000-memory.dmp
                    Filesize

                    4KB

                  • memory/2480-178-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2480-175-0x0000000000000000-mapping.dmp
                  • memory/2536-259-0x0000000000339A6B-mapping.dmp
                  • memory/2536-258-0x0000000000330000-0x0000000000345000-memory.dmp
                    Filesize

                    84KB

                  • memory/2552-136-0x0000000000000000-mapping.dmp
                  • memory/2552-139-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2560-107-0x0000000000000000-mapping.dmp
                  • memory/2624-60-0x0000000000000000-mapping.dmp
                  • memory/2836-95-0x0000000000000000-mapping.dmp
                  • memory/2840-96-0x00007FF6CDE48270-mapping.dmp
                  • memory/2840-97-0x00007FF8F09C0000-0x00007FF8F0A3E000-memory.dmp
                    Filesize

                    504KB

                  • memory/2840-99-0x0000000010000000-0x0000000010057000-memory.dmp
                    Filesize

                    348KB

                  • memory/2860-133-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2860-129-0x0000000000000000-mapping.dmp
                  • memory/2908-83-0x0000000000000000-mapping.dmp
                  • memory/2920-218-0x0000000000000000-mapping.dmp
                  • memory/2944-57-0x0000000010000000-0x000000001033D000-memory.dmp
                    Filesize

                    3.2MB

                  • memory/2944-50-0x0000000000000000-mapping.dmp
                  • memory/2944-53-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/2968-159-0x0000000000000000-mapping.dmp
                  • memory/2968-161-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/3040-19-0x0000000000000000-mapping.dmp
                  • memory/3056-106-0x0000000000000000-mapping.dmp
                  • memory/3132-12-0x0000000000000000-mapping.dmp
                  • memory/3132-11-0x0000000000000000-mapping.dmp
                  • memory/3172-100-0x0000000000000000-mapping.dmp
                  • memory/3192-238-0x0000000000000000-mapping.dmp
                  • memory/3276-108-0x00007FF6CDE48270-mapping.dmp
                  • memory/3276-109-0x00007FF8F09C0000-0x00007FF8F0A3E000-memory.dmp
                    Filesize

                    504KB

                  • memory/3276-239-0x0000000000000000-mapping.dmp
                  • memory/3336-146-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/3336-143-0x0000000000000000-mapping.dmp
                  • memory/3352-183-0x0000000000000000-mapping.dmp
                  • memory/3488-110-0x0000000000000000-mapping.dmp
                  • memory/3488-113-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/3568-185-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/3568-181-0x0000000000000000-mapping.dmp
                  • memory/3584-180-0x0000000000000000-mapping.dmp
                  • memory/3884-45-0x0000000010B40000-0x0000000010B41000-memory.dmp
                    Filesize

                    4KB

                  • memory/3884-35-0x0000000000000000-mapping.dmp
                  • memory/3884-38-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/3884-40-0x0000000071BF0000-0x00000000722DE000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/3884-43-0x0000000010B20000-0x0000000010B21000-memory.dmp
                    Filesize

                    4KB

                  • memory/3924-88-0x0000000000000000-mapping.dmp
                  • memory/3928-16-0x0000000000000000-mapping.dmp
                  • memory/3928-15-0x0000000000000000-mapping.dmp
                  • memory/4040-87-0x00000000042B0000-0x0000000004761000-memory.dmp
                    Filesize

                    4.7MB

                  • memory/4040-77-0x0000000072D90000-0x0000000072E23000-memory.dmp
                    Filesize

                    588KB

                  • memory/4040-74-0x0000000000000000-mapping.dmp
                  • memory/4184-323-0x0000000000000000-mapping.dmp
                  • memory/4216-244-0x0000000004D20000-0x0000000004D21000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-278-0x0000000009020000-0x0000000009021000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-220-0x0000000000000000-mapping.dmp
                  • memory/4216-282-0x00000000091F0000-0x00000000091F1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-242-0x0000000004D20000-0x0000000004D21000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-321-0x00000000098D0000-0x00000000098D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-245-0x0000000070BD0000-0x00000000712BE000-memory.dmp
                    Filesize

                    6.9MB

                  • memory/4216-288-0x0000000009810000-0x0000000009811000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-246-0x0000000004CE0000-0x0000000004D03000-memory.dmp
                    Filesize

                    140KB

                  • memory/4216-249-0x0000000007AA0000-0x0000000007AA1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-251-0x0000000008120000-0x0000000008121000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-256-0x00000000081B0000-0x00000000081B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-247-0x00000000075A0000-0x00000000075A1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-248-0x00000000051B0000-0x00000000051D2000-memory.dmp
                    Filesize

                    136KB

                  • memory/4216-322-0x0000000009960000-0x0000000009961000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-241-0x00000000032B8000-0x00000000032B9000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-253-0x0000000008160000-0x0000000008161000-memory.dmp
                    Filesize

                    4KB

                  • memory/4216-262-0x0000000008330000-0x0000000008331000-memory.dmp
                    Filesize

                    4KB

                  • memory/4520-240-0x0000000000000000-mapping.dmp
                  • memory/4888-223-0x0000000000000000-mapping.dmp
                  • memory/4904-205-0x00000000008B0000-0x00000000008B1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4904-193-0x0000000000000000-mapping.dmp
                  • memory/4912-261-0x0000000000000000-mapping.dmp
                  • memory/4920-226-0x0000000000000000-mapping.dmp
                  • memory/4924-211-0x0000000004E60000-0x0000000004E61000-memory.dmp
                    Filesize

                    4KB

                  • memory/4924-196-0x0000000000000000-mapping.dmp
                  • memory/4924-209-0x0000000003258000-0x0000000003259000-memory.dmp
                    Filesize

                    4KB

                  • memory/4928-276-0x00000000008E0000-0x00000000008E1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4952-213-0x0000000004D50000-0x0000000004D51000-memory.dmp
                    Filesize

                    4KB

                  • memory/4952-214-0x0000000004D50000-0x0000000004D51000-memory.dmp
                    Filesize

                    4KB

                  • memory/4952-212-0x0000000003088000-0x0000000003089000-memory.dmp
                    Filesize

                    4KB

                  • memory/4952-199-0x0000000000000000-mapping.dmp
                  • memory/4956-267-0x00000000008D0000-0x00000000008D1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4956-250-0x0000000000000000-mapping.dmp
                  • memory/4980-225-0x0000000004CE0000-0x0000000004CE1000-memory.dmp
                    Filesize

                    4KB

                  • memory/4980-224-0x0000000003338000-0x0000000003339000-memory.dmp
                    Filesize

                    4KB

                  • memory/4980-202-0x0000000000000000-mapping.dmp
                  • memory/5040-210-0x0000000010000000-0x00000000100E4000-memory.dmp
                    Filesize

                    912KB

                  • memory/5040-206-0x0000000000000000-mapping.dmp
                  • memory/5052-234-0x0000000000000000-mapping.dmp
                  • memory/5052-263-0x0000000003298000-0x0000000003299000-memory.dmp
                    Filesize

                    4KB

                  • memory/5052-264-0x0000000004E80000-0x0000000004E81000-memory.dmp
                    Filesize

                    4KB

                  • memory/5092-232-0x0000000000000000-mapping.dmp
                  • memory/5100-243-0x0000000000000000-mapping.dmp