Resubmissions

08-10-2021 15:07

211008-shl8xsefa9 10

08-10-2021 05:38

211008-gbvqyadce8 10

07-10-2021 18:28

211007-w4jayacge3 10

Analysis

  • max time kernel
    113s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    08-10-2021 05:38

General

  • Target

    setup_x86_x64_install.exe

  • Size

    5.9MB

  • MD5

    0308d3044eda0db671c58c2a97cb3c10

  • SHA1

    1737ab616a61d35b0bde0aaad949d9894e14be9e

  • SHA256

    b52242da50ea2b3a05f6787dfa7197a0c99442e91d3bc78b71363c2ff3c4f072

  • SHA512

    29902fe4a53319290d18b65a6baa1d747f1389a84cd7eb1a123d05b418b737336cd54c84b76403bc2cbb1f078c19b4461a89eec8214bfcdcf4831bb1dbda0e3e

Malware Config

Extracted

Family

vidar

Version

41.2

Botnet

916

C2

https://mas.to/@serg4325

Attributes
  • profile_id

    916

Extracted

Family

smokeloader

Version

2020

C2

http://gmpeople.com/upload/

http://mile48.com/upload/

http://lecanardstsornin.com/upload/

http://m3600.com/upload/

http://camasirx.com/upload/

rc4.i32
rc4.i32

Extracted

Family

raccoon

Version

1.8.2

Botnet

3a6818b104313fce1772361ea1977d608ac93da0

Attributes
  • url4cnc

    http://teletop.top/kaba4ello

    http://teleta.top/kaba4ello

    https://t.me/kaba4ello

rc4.plain
rc4.plain

Extracted

Family

vidar

Version

41.2

Botnet

937

C2

https://mas.to/@serg4325

Attributes
  • profile_id

    937

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • ASPack v2.12-2.42 7 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 9 IoCs
  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:568
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2380
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Thu166f9a8bbe80.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1368
          • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu166f9a8bbe80.exe
            Thu166f9a8bbe80.exe
            5⤵
            • Executes dropped EXE
            PID:3696
            • C:\Users\Admin\Pictures\Adobe Films\PdL_1oO6wpi_LGEVgrwkZ_dx.exe
              "C:\Users\Admin\Pictures\Adobe Films\PdL_1oO6wpi_LGEVgrwkZ_dx.exe"
              6⤵
                PID:4176
              • C:\Users\Admin\Pictures\Adobe Films\iszkLT_vFVafbOzsXVopjb3E.exe
                "C:\Users\Admin\Pictures\Adobe Films\iszkLT_vFVafbOzsXVopjb3E.exe"
                6⤵
                  PID:4184
                • C:\Users\Admin\Pictures\Adobe Films\bvsEbAFv8guAkJR_qPMLxpsy.exe
                  "C:\Users\Admin\Pictures\Adobe Films\bvsEbAFv8guAkJR_qPMLxpsy.exe"
                  6⤵
                    PID:5068
                    • C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe
                      "C:\Users\Admin\Documents\iAeXXqhQNJKur7teIlOrvF32.exe"
                      7⤵
                        PID:2288
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                        7⤵
                        • Creates scheduled task(s)
                        PID:5584
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                        7⤵
                        • Creates scheduled task(s)
                        PID:5004
                    • C:\Users\Admin\Pictures\Adobe Films\GSCXJXNhyZWDqvEKiGDwj5xl.exe
                      "C:\Users\Admin\Pictures\Adobe Films\GSCXJXNhyZWDqvEKiGDwj5xl.exe"
                      6⤵
                        PID:4232
                      • C:\Users\Admin\Pictures\Adobe Films\fQfWX7gJc9orXNPgR1hHPSCV.exe
                        "C:\Users\Admin\Pictures\Adobe Films\fQfWX7gJc9orXNPgR1hHPSCV.exe"
                        6⤵
                          PID:4796
                          • C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe
                            "C:\Program Files (x86)\Company\NewProduct\DownFlSetup999.exe"
                            7⤵
                              PID:5128
                            • C:\Program Files (x86)\Company\NewProduct\inst002.exe
                              "C:\Program Files (x86)\Company\NewProduct\inst002.exe"
                              7⤵
                                PID:3952
                              • C:\Program Files (x86)\Company\NewProduct\cm3.exe
                                "C:\Program Files (x86)\Company\NewProduct\cm3.exe"
                                7⤵
                                  PID:5184
                              • C:\Users\Admin\Pictures\Adobe Films\nFeNc2kehtHUrqXiZrYvZ3ot.exe
                                "C:\Users\Admin\Pictures\Adobe Films\nFeNc2kehtHUrqXiZrYvZ3ot.exe"
                                6⤵
                                  PID:1484
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 1220
                                    7⤵
                                    • Program crash
                                    PID:5052
                                • C:\Users\Admin\Pictures\Adobe Films\EBTvJII5C1uiTmKWti0lAKF5.exe
                                  "C:\Users\Admin\Pictures\Adobe Films\EBTvJII5C1uiTmKWti0lAKF5.exe"
                                  6⤵
                                    PID:2176
                                  • C:\Users\Admin\Pictures\Adobe Films\sTvRgd88Pnnpc9y3lhCkZid5.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\sTvRgd88Pnnpc9y3lhCkZid5.exe"
                                    6⤵
                                      PID:4884
                                    • C:\Users\Admin\Pictures\Adobe Films\_BO2hihdicETyLfVEYucSleq.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\_BO2hihdicETyLfVEYucSleq.exe"
                                      6⤵
                                        PID:1016
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 248
                                          7⤵
                                          • Program crash
                                          PID:5204
                                      • C:\Users\Admin\Pictures\Adobe Films\PjVkRUxcjyxSueg6q8hayeR3.exe
                                        "C:\Users\Admin\Pictures\Adobe Films\PjVkRUxcjyxSueg6q8hayeR3.exe"
                                        6⤵
                                          PID:932
                                        • C:\Users\Admin\Pictures\Adobe Films\1HdiB5UzWLVbwBEdSL3syMbk.exe
                                          "C:\Users\Admin\Pictures\Adobe Films\1HdiB5UzWLVbwBEdSL3syMbk.exe"
                                          6⤵
                                            PID:5532
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /c taskkill /f /im chrome.exe
                                              7⤵
                                                PID:1752
                                                • C:\Windows\SysWOW64\taskkill.exe
                                                  taskkill /f /im chrome.exe
                                                  8⤵
                                                  • Kills process with taskkill
                                                  PID:5592
                                            • C:\Users\Admin\Pictures\Adobe Films\eEPvi79kjhCH9dVXGFw3OpAR.exe
                                              "C:\Users\Admin\Pictures\Adobe Films\eEPvi79kjhCH9dVXGFw3OpAR.exe"
                                              6⤵
                                                PID:5864
                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                  7⤵
                                                    PID:4920
                                                • C:\Users\Admin\Pictures\Adobe Films\CQ1x3AWP_G2q1NtRd_gke3KU.exe
                                                  "C:\Users\Admin\Pictures\Adobe Films\CQ1x3AWP_G2q1NtRd_gke3KU.exe"
                                                  6⤵
                                                    PID:6048
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                      7⤵
                                                        PID:2832
                                                    • C:\Users\Admin\Pictures\Adobe Films\Lkz2ovxbwHff_a9sVZGBb3Go.exe
                                                      "C:\Users\Admin\Pictures\Adobe Films\Lkz2ovxbwHff_a9sVZGBb3Go.exe"
                                                      6⤵
                                                        PID:3052
                                                      • C:\Users\Admin\Pictures\Adobe Films\ZPMFurQazo9qZNOzthQ9KqYJ.exe
                                                        "C:\Users\Admin\Pictures\Adobe Films\ZPMFurQazo9qZNOzthQ9KqYJ.exe"
                                                        6⤵
                                                          PID:5272
                                                        • C:\Users\Admin\Pictures\Adobe Films\vSOVDcvzq8JjYgUNSkFHAEo4.exe
                                                          "C:\Users\Admin\Pictures\Adobe Films\vSOVDcvzq8JjYgUNSkFHAEo4.exe"
                                                          6⤵
                                                            PID:5484
                                                            • C:\Users\Admin\Pictures\Adobe Films\vSOVDcvzq8JjYgUNSkFHAEo4.exe
                                                              "C:\Users\Admin\Pictures\Adobe Films\vSOVDcvzq8JjYgUNSkFHAEo4.exe"
                                                              7⤵
                                                                PID:6124
                                                            • C:\Users\Admin\Pictures\Adobe Films\BLH9_uJX07SeYZy4DIQg9FU4.exe
                                                              "C:\Users\Admin\Pictures\Adobe Films\BLH9_uJX07SeYZy4DIQg9FU4.exe"
                                                              6⤵
                                                                PID:5848
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                  7⤵
                                                                    PID:5580
                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe"
                                                                      8⤵
                                                                        PID:4036
                                                                  • C:\Users\Admin\Pictures\Adobe Films\hjB2G6r0hCnokBo0xrnNIA92.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\hjB2G6r0hCnokBo0xrnNIA92.exe"
                                                                    6⤵
                                                                      PID:2704
                                                                    • C:\Users\Admin\Pictures\Adobe Films\ZBxskK_Tx1TesjICPGChzgBi.exe
                                                                      "C:\Users\Admin\Pictures\Adobe Films\ZBxskK_Tx1TesjICPGChzgBi.exe"
                                                                      6⤵
                                                                        PID:4000
                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                          "C:\Windows\System32\mshta.exe" vbscRipt: ClOsE ( CrEATEoBjeCT ( "wsCrIpt.shELl" ). RUn ( "C:\Windows\system32\cmd.exe /Q /c TyPe ""C:\Users\Admin\Pictures\Adobe Films\ZBxskK_Tx1TesjICPGChzgBi.exe"" > ..\aDLsKHQL9R.exE && STaRT ..\aDLsKHQL9R.exe -pb0sP2z4l4ZpZ1d2K9 & if """" == """" for %Q IN ( ""C:\Users\Admin\Pictures\Adobe Films\ZBxskK_Tx1TesjICPGChzgBi.exe"" ) do taskkill /f /Im ""%~nxQ"" ", 0 , TRUe ))
                                                                          7⤵
                                                                            PID:5924
                                                                        • C:\Users\Admin\Pictures\Adobe Films\zr5MWhSdX8nssdft6tv5y3jz.exe
                                                                          "C:\Users\Admin\Pictures\Adobe Films\zr5MWhSdX8nssdft6tv5y3jz.exe"
                                                                          6⤵
                                                                            PID:5884
                                                                          • C:\Users\Admin\Pictures\Adobe Films\6MlqnuWrTjmG9S8FFcUpZGax.exe
                                                                            "C:\Users\Admin\Pictures\Adobe Films\6MlqnuWrTjmG9S8FFcUpZGax.exe"
                                                                            6⤵
                                                                              PID:5908
                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                7⤵
                                                                                  PID:5832
                                                                              • C:\Users\Admin\Pictures\Adobe Films\m9Bn_d6Qr9xS2mweHrrxa16j.exe
                                                                                "C:\Users\Admin\Pictures\Adobe Films\m9Bn_d6Qr9xS2mweHrrxa16j.exe"
                                                                                6⤵
                                                                                  PID:5356
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\m9Bn_d6Qr9xS2mweHrrxa16j.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\m9Bn_d6Qr9xS2mweHrrxa16j.exe"
                                                                                    7⤵
                                                                                      PID:488
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\PrQ25J3R_129DPN0GSfQoOpb.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\PrQ25J3R_129DPN0GSfQoOpb.exe"
                                                                                    6⤵
                                                                                      PID:4716
                                                                                    • C:\Users\Admin\Pictures\Adobe Films\Hlosk9uw8BbFwVWYz9OIxxtV.exe
                                                                                      "C:\Users\Admin\Pictures\Adobe Films\Hlosk9uw8BbFwVWYz9OIxxtV.exe"
                                                                                      6⤵
                                                                                        PID:5540
                                                                                      • C:\Users\Admin\Pictures\Adobe Films\KqPg3BoCyhi7OXTZEYVciprV.exe
                                                                                        "C:\Users\Admin\Pictures\Adobe Films\KqPg3BoCyhi7OXTZEYVciprV.exe"
                                                                                        6⤵
                                                                                          PID:4388
                                                                                          • C:\Users\Admin\Pictures\Adobe Films\KqPg3BoCyhi7OXTZEYVciprV.exe
                                                                                            "C:\Users\Admin\Pictures\Adobe Films\KqPg3BoCyhi7OXTZEYVciprV.exe"
                                                                                            7⤵
                                                                                              PID:4564
                                                                                          • C:\Users\Admin\Pictures\Adobe Films\w8Tpn7cxZfs82ml68wgCEVn9.exe
                                                                                            "C:\Users\Admin\Pictures\Adobe Films\w8Tpn7cxZfs82ml68wgCEVn9.exe"
                                                                                            6⤵
                                                                                              PID:3736
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c Thu16205451b994.exe /mixone
                                                                                          4⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1300
                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16205451b994.exe
                                                                                            Thu16205451b994.exe /mixone
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2616
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 656
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:4360
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 676
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:4888
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 808
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:4544
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 812
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:4732
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 884
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:5488
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 868
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:5380
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 1104
                                                                                              6⤵
                                                                                              • Program crash
                                                                                              PID:5696
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c Thu16466b26f8b7.exe
                                                                                          4⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1932
                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16466b26f8b7.exe
                                                                                            Thu16466b26f8b7.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Checks SCSI registry key(s)
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:1884
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c Thu165bd34b1e1d4d81.exe
                                                                                          4⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:2152
                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu165bd34b1e1d4d81.exe
                                                                                            Thu165bd34b1e1d4d81.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3548
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd.exe /c taskkill /f /im chrome.exe
                                                                                              6⤵
                                                                                                PID:3268
                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                  taskkill /f /im chrome.exe
                                                                                                  7⤵
                                                                                                  • Kills process with taskkill
                                                                                                  PID:4944
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c Thu1628aafb3efd7c3d.exe
                                                                                            4⤵
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:2036
                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1628aafb3efd7c3d.exe
                                                                                              Thu1628aafb3efd7c3d.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              PID:1940
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                "C:\Windows\System32\cmd.exe" /c taskkill /im Thu1628aafb3efd7c3d.exe /f & timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1628aafb3efd7c3d.exe" & del C:\ProgramData\*.dll & exit
                                                                                                6⤵
                                                                                                  PID:5096
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /im Thu1628aafb3efd7c3d.exe /f
                                                                                                    7⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:5584
                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                    timeout /t 6
                                                                                                    7⤵
                                                                                                    • Delays execution with timeout.exe
                                                                                                    PID:4512
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c Thu161580bf75.exe
                                                                                              4⤵
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:1364
                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu161580bf75.exe
                                                                                                Thu161580bf75.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3920
                                                                                                • C:\Users\Admin\AppData\Roaming\5352073.scr
                                                                                                  "C:\Users\Admin\AppData\Roaming\5352073.scr" /S
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:372
                                                                                                • C:\Users\Admin\AppData\Roaming\5744367.scr
                                                                                                  "C:\Users\Admin\AppData\Roaming\5744367.scr" /S
                                                                                                  6⤵
                                                                                                    PID:3032
                                                                                                    • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                                                                                                      7⤵
                                                                                                        PID:3612
                                                                                                    • C:\Users\Admin\AppData\Roaming\4157100.scr
                                                                                                      "C:\Users\Admin\AppData\Roaming\4157100.scr" /S
                                                                                                      6⤵
                                                                                                        PID:3960
                                                                                                      • C:\Users\Admin\AppData\Roaming\1539802.scr
                                                                                                        "C:\Users\Admin\AppData\Roaming\1539802.scr" /S
                                                                                                        6⤵
                                                                                                          PID:4008
                                                                                                        • C:\Users\Admin\AppData\Roaming\6059293.scr
                                                                                                          "C:\Users\Admin\AppData\Roaming\6059293.scr" /S
                                                                                                          6⤵
                                                                                                            PID:4344
                                                                                                          • C:\Users\Admin\AppData\Roaming\1932722.scr
                                                                                                            "C:\Users\Admin\AppData\Roaming\1932722.scr" /S
                                                                                                            6⤵
                                                                                                              PID:4252
                                                                                                              • C:\Users\Admin\AppData\Roaming\1932722.scr
                                                                                                                "C:\Users\Admin\AppData\Roaming\1932722.scr"
                                                                                                                7⤵
                                                                                                                  PID:4776
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4776 -s 572
                                                                                                                    8⤵
                                                                                                                    • Program crash
                                                                                                                    PID:5760
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c Thu16f584bd3686.exe
                                                                                                            4⤵
                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                            PID:2124
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f584bd3686.exe
                                                                                                              Thu16f584bd3686.exe
                                                                                                              5⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:1900
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c Thu164ba03be19.exe
                                                                                                            4⤵
                                                                                                              PID:3828
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu164ba03be19.exe
                                                                                                                Thu164ba03be19.exe
                                                                                                                5⤵
                                                                                                                • Executes dropped EXE
                                                                                                                PID:1172
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu164ba03be19.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu164ba03be19.exe
                                                                                                                  6⤵
                                                                                                                    PID:3940
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu164ba03be19.exe
                                                                                                                    C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu164ba03be19.exe
                                                                                                                    6⤵
                                                                                                                      PID:4212
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c Thu16f3de88a335950bb.exe
                                                                                                                  4⤵
                                                                                                                    PID:2288
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f3de88a335950bb.exe
                                                                                                                      Thu16f3de88a335950bb.exe
                                                                                                                      5⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:3052
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-R8DVV.tmp\Thu16f3de88a335950bb.tmp
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-R8DVV.tmp\Thu16f3de88a335950bb.tmp" /SL5="$50048,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f3de88a335950bb.exe"
                                                                                                                        6⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Loads dropped DLL
                                                                                                                        PID:3988
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f3de88a335950bb.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f3de88a335950bb.exe" /SILENT
                                                                                                                          7⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:1436
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-TI998.tmp\Thu16f3de88a335950bb.tmp
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-TI998.tmp\Thu16f3de88a335950bb.tmp" /SL5="$40080,1570064,56832,C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu16f3de88a335950bb.exe" /SILENT
                                                                                                                            8⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Loads dropped DLL
                                                                                                                            PID:1876
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\is-IT6EM.tmp\postback.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\is-IT6EM.tmp\postback.exe" ss1
                                                                                                                              9⤵
                                                                                                                                PID:4564
                                                                                                                              • C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe
                                                                                                                                "C:\Program Files (x86)\FarLabUninstaller\FarLabUninstaller.exe" ss1
                                                                                                                                9⤵
                                                                                                                                  PID:4584
                                                                                                                                • C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe
                                                                                                                                  "C:\Program Files (x86)\FarLabUninstaller\NDP472-KB4054531-Web.exe" /q /norestart
                                                                                                                                  9⤵
                                                                                                                                    PID:4636
                                                                                                                                    • C:\0ab24a46fc311a48f3d626\Setup.exe
                                                                                                                                      C:\0ab24a46fc311a48f3d626\\Setup.exe /q /norestart /x86 /x64 /web
                                                                                                                                      10⤵
                                                                                                                                        PID:4844
                                                                                                                                        • C:\0ab24a46fc311a48f3d626\SetupUtility.exe
                                                                                                                                          SetupUtility.exe /aupause
                                                                                                                                          11⤵
                                                                                                                                            PID:4448
                                                                                                                                          • C:\0ab24a46fc311a48f3d626\SetupUtility.exe
                                                                                                                                            SetupUtility.exe /screboot
                                                                                                                                            11⤵
                                                                                                                                              PID:1688
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c Thu1653d94a8da.exe
                                                                                                                                4⤵
                                                                                                                                  PID:3264
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1653d94a8da.exe
                                                                                                                                    Thu1653d94a8da.exe
                                                                                                                                    5⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:624
                                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                      "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1653d94a8da.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1653d94a8da.exe"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                      6⤵
                                                                                                                                        PID:1432
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1653d94a8da.exe" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu1653d94a8da.exe" ) do taskkill /F -Im "%~NxU"
                                                                                                                                          7⤵
                                                                                                                                            PID:4200
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\09xU.exE
                                                                                                                                              09xU.EXE -pPtzyIkqLZoCarb5ew
                                                                                                                                              8⤵
                                                                                                                                                PID:4788
                                                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                  "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                                                  9⤵
                                                                                                                                                    PID:5100
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE" ) do taskkill /F -Im "%~NxU"
                                                                                                                                                      10⤵
                                                                                                                                                        PID:4444
                                                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                      "C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " , 0 ,TRuE ) )
                                                                                                                                                      9⤵
                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                      PID:3548
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        "C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I
                                                                                                                                                        10⤵
                                                                                                                                                          PID:5412
                                                                                                                                                    • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                      taskkill /F -Im "Thu1653d94a8da.exe"
                                                                                                                                                      8⤵
                                                                                                                                                      • Kills process with taskkill
                                                                                                                                                      PID:4608
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c Thu167d514d2a7ac5a.exe
                                                                                                                                              4⤵
                                                                                                                                                PID:1476
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS09B52AB4\Thu167d514d2a7ac5a.exe
                                                                                                                                                  Thu167d514d2a7ac5a.exe
                                                                                                                                                  5⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  PID:2716
                                                                                                                                        • C:\Windows\system32\rundll32.exe
                                                                                                                                          rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                          1⤵
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          PID:408
                                                                                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                            2⤵
                                                                                                                                              PID:1172
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                            1⤵
                                                                                                                                              PID:2892
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\E86D.exe
                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\E86D.exe
                                                                                                                                              1⤵
                                                                                                                                                PID:4784

                                                                                                                                              Network

                                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                                              Replay Monitor

                                                                                                                                              Loading Replay Monitor...

                                                                                                                                              Downloads

                                                                                                                                              • memory/68-408-0x00000178CDD60000-0x00000178CDDD2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/372-261-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/372-245-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/372-257-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/372-239-0x0000000000540000-0x0000000000541000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/372-252-0x0000000004D10000-0x0000000004D59000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                292KB

                                                                                                                                              • memory/624-194-0x0000000002590000-0x0000000002591000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/624-197-0x0000000002590000-0x0000000002591000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/684-454-0x0000024816010000-0x0000024816082000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/868-138-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.5MB

                                                                                                                                              • memory/868-135-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.5MB

                                                                                                                                              • memory/868-139-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                152KB

                                                                                                                                              • memory/868-146-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                100KB

                                                                                                                                              • memory/868-134-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                572KB

                                                                                                                                              • memory/868-153-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                100KB

                                                                                                                                              • memory/868-132-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                572KB

                                                                                                                                              • memory/868-137-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.5MB

                                                                                                                                              • memory/868-136-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.5MB

                                                                                                                                              • memory/868-150-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                100KB

                                                                                                                                              • memory/868-133-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                572KB

                                                                                                                                              • memory/868-147-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                100KB

                                                                                                                                              • memory/932-471-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/932-499-0x0000000005D70000-0x0000000006376000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.0MB

                                                                                                                                              • memory/1072-449-0x00000207F6760000-0x00000207F67D2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1172-211-0x0000000004DC0000-0x0000000004DC1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1172-243-0x00000000053C0000-0x00000000053C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1172-366-0x0000000003FA0000-0x0000000003FFD000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                372KB

                                                                                                                                              • memory/1172-204-0x0000000000560000-0x0000000000561000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1172-218-0x0000000002640000-0x0000000002641000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1172-217-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1172-365-0x0000000004073000-0x0000000004174000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.0MB

                                                                                                                                              • memory/1204-473-0x000001CC611B0000-0x000001CC61222000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1252-391-0x000002489A450000-0x000002489A4C2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1252-376-0x000002489A390000-0x000002489A3DD000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                308KB

                                                                                                                                              • memory/1280-497-0x000001CC40060000-0x000001CC400D2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1388-467-0x000001263AA70000-0x000001263AAE2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1436-230-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB

                                                                                                                                              • memory/1484-504-0x00000000070B0000-0x000000000C0DC000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80.2MB

                                                                                                                                              • memory/1848-476-0x00000200F0B20000-0x00000200F0B92000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/1876-231-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/1884-219-0x0000000002E80000-0x0000000002E89000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                36KB

                                                                                                                                              • memory/1884-229-0x0000000000400000-0x0000000002D9C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                41.6MB

                                                                                                                                              • memory/1940-228-0x0000000000400000-0x0000000002E08000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                42.0MB

                                                                                                                                              • memory/1940-214-0x0000000004B70000-0x0000000004C46000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                856KB

                                                                                                                                              • memory/2176-410-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/2176-453-0x00000000055E0000-0x0000000005BE6000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.0MB

                                                                                                                                              • memory/2380-289-0x0000000007490000-0x0000000007491000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-293-0x0000000007EA0000-0x0000000007EA1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-402-0x000000007EFF0000-0x000000007EFF1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-249-0x0000000007650000-0x0000000007651000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-198-0x0000000004230000-0x0000000004231000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-195-0x0000000004230000-0x0000000004231000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-238-0x0000000006D20000-0x0000000006D21000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-213-0x00000000047B2000-0x00000000047B3000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-209-0x00000000047B0000-0x00000000047B1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-210-0x0000000006E40000-0x0000000006E41000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-253-0x0000000007760000-0x0000000007761000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-465-0x00000000047B3000-0x00000000047B4000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-248-0x00000000074E0000-0x00000000074E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2380-208-0x00000000046D0000-0x00000000046D1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/2516-423-0x00000238D2D40000-0x00000238D2DB2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/2528-445-0x00000215CD140000-0x00000215CD1B2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/2616-227-0x0000000000400000-0x0000000002DBC000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                41.7MB

                                                                                                                                              • memory/2616-216-0x0000000002E40000-0x0000000002EEE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                696KB

                                                                                                                                              • memory/2708-290-0x0000000000870000-0x0000000000885000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                84KB

                                                                                                                                              • memory/2772-395-0x00000292630C0000-0x0000029263132000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/2788-502-0x00000264C0A40000-0x00000264C0AB2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/2804-511-0x0000028F1D900000-0x0000028F1D972000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/2892-398-0x000001BB9F170000-0x000001BB9F1E2000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                456KB

                                                                                                                                              • memory/3032-260-0x0000000002DD0000-0x0000000002DD1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3032-258-0x00000000055C0000-0x00000000055C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3032-246-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3032-250-0x0000000005370000-0x0000000005371000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3032-251-0x0000000002D40000-0x0000000002D4C000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                48KB

                                                                                                                                              • memory/3052-202-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                80KB

                                                                                                                                              • memory/3612-301-0x000000000E4F0000-0x000000000E4F1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3612-303-0x00000000051E0000-0x00000000051E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3696-259-0x0000000005650000-0x0000000005793000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.3MB

                                                                                                                                              • memory/3920-200-0x000000001B020000-0x000000001B022000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                              • memory/3920-177-0x0000000000370000-0x0000000000371000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3920-186-0x0000000000890000-0x0000000000891000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-298-0x0000000005EA0000-0x0000000005EA1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-306-0x0000000005D40000-0x0000000005D41000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-296-0x0000000005D70000-0x0000000005D71000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-274-0x0000000001350000-0x0000000001351000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-288-0x0000000006360000-0x0000000006361000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3960-284-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/3960-309-0x0000000005DD0000-0x0000000005DD1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/3988-215-0x00000000001E0000-0x00000000001E1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4008-307-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/4008-342-0x00000000061C0000-0x00000000061C1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4184-372-0x0000000004AA0000-0x0000000004B76000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                856KB

                                                                                                                                              • memory/4184-416-0x0000000000400000-0x0000000002E0F000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                42.1MB

                                                                                                                                              • memory/4212-343-0x0000000005590000-0x0000000005B96000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                6.0MB

                                                                                                                                              • memory/4232-367-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/4232-406-0x0000000005710000-0x0000000005711000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4252-295-0x0000000000770000-0x0000000000771000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4252-308-0x00000000050D0000-0x00000000055CE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                5.0MB

                                                                                                                                              • memory/4344-346-0x0000000004D80000-0x0000000004D81000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4584-421-0x0000000004CE3000-0x0000000004CE5000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                8KB

                                                                                                                                              • memory/4584-354-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/4776-426-0x0000000000400000-0x0000000000491000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                580KB

                                                                                                                                              • memory/4884-413-0x0000000077C50000-0x0000000077DDE000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                1.6MB

                                                                                                                                              • memory/4884-456-0x0000000005AD0000-0x0000000005AD1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB

                                                                                                                                              • memory/5864-508-0x0000000002CC0000-0x0000000002D04000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                272KB

                                                                                                                                              • memory/5864-527-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

                                                                                                                                                Filesize

                                                                                                                                                4KB