Analysis

  • max time kernel
    141s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-02-2024 05:36

General

  • Target

    b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe

  • Size

    217KB

  • MD5

    ea8dcf2eee76f737f8796bdbf7e33a06

  • SHA1

    a30a310bf397ac2c5c15df009f12c91b7a2641b4

  • SHA256

    b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8

  • SHA512

    305c1b28f68dff88cf0006d61c3210e9b32f32490ddfcd361fc0923214e39aacd936a1f3a195b6fd3a876f5eacf054ce22d15b6fcc254024d33f5f6e13ea1e3b

  • SSDEEP

    3072:d3tinQnUoC0pvo/Uw/3BofIclBYKw6tkp3P00gpUCL5HVFUjWjJkp:d3cnQnO+vNlBH1t4P0a65HYjWjm

Malware Config

Extracted

Family

smokeloader

Botnet

tfd5

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

redline

Botnet

LogsDiller Cloud (Telegram: @logsdillabot)

C2

5.42.65.38:46185

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects LgoogLoader payload 1 IoCs
  • LgoogLoader

    A downloader capable of dropping and executing other malware families.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 3 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF 1 IoCs
  • Detects Windows executables referencing non-Windows User-Agents 1 IoCs
  • Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
  • Detects executables embedding command execution via IExecuteCommand COM object 1 IoCs
  • Detects executables packed with Themida 15 IoCs
  • Detects executables packed with unregistered version of .NET Reactor 6 IoCs
  • Detects executables potentially checking for WinJail sandbox window 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • UPX dump on OEP (original entry point) 17 IoCs
  • XMRig Miner payload 13 IoCs
  • Creates new service(s) 1 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 3 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 15 IoCs

    Detects Themida, an advanced Windows software protection system.

  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 18 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe
    "C:\Users\Admin\AppData\Local\Temp\b8a974ff0066513b4fac4f6a256a39933af90a9df9b03d6234d1a4bf88b7b0e8.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:2040
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DF06.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:4472
    • C:\Users\Admin\AppData\Local\Temp\FDAA.exe
      C:\Users\Admin\AppData\Local\Temp\FDAA.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4424
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3752
        • C:\Users\Admin\AppData\Local\Temp\filename.exe
          "C:\Users\Admin\AppData\Local\Temp\filename.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Drops file in Drivers directory
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2288
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4636
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            4⤵
            • Launches sc.exe
            PID:2416
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4964
            • C:\Windows\system32\wusa.exe
              wusa /uninstall /kb:890830 /quiet /norestart
              5⤵
                PID:3780
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop WaaSMedicSvc
              4⤵
              • Launches sc.exe
              PID:4524
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop wuauserv
              4⤵
              • Launches sc.exe
              PID:4900
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop bits
              4⤵
              • Launches sc.exe
              PID:760
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop dosvc
              4⤵
              • Launches sc.exe
              PID:3404
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:212
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1492
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
              4⤵
              • Launches sc.exe
              PID:1996
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1596
            • C:\Windows\system32\powercfg.exe
              C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
              4⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:780
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
              4⤵
              • Launches sc.exe
              PID:856
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe stop eventlog
              4⤵
              • Launches sc.exe
              PID:2996
            • C:\Windows\system32\sc.exe
              C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
              4⤵
              • Launches sc.exe
              PID:1616
      • C:\Users\Admin\AppData\Local\Temp\29AD.exe
        C:\Users\Admin\AppData\Local\Temp\29AD.exe
        1⤵
        • Executes dropped EXE
        PID:3872
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\2E80.bat" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Windows\system32\reg.exe
          reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
          2⤵
            PID:1576
        • C:\Users\Admin\AppData\Local\Temp\34CB.exe
          C:\Users\Admin\AppData\Local\Temp\34CB.exe
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
              PID:3304
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              2⤵
              • Checks computer location settings
              • Drops startup file
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4328
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe"
                3⤵
                • Executes dropped EXE
                PID:1768
          • C:\Users\Admin\AppData\Local\Temp\5312.exe
            C:\Users\Admin\AppData\Local\Temp\5312.exe
            1⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious use of FindShellTrayWindow
            PID:1656
          • C:\Users\Admin\AppData\Local\Temp\5A95.exe
            C:\Users\Admin\AppData\Local\Temp\5A95.exe
            1⤵
            • UAC bypass
            • Windows security bypass
            • Checks computer location settings
            • Executes dropped EXE
            • Windows security modification
            • Checks whether UAC is enabled
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:760
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\5A95.exe" -Force
              2⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:804
            • C:\Windows\SysWOW64\calc.exe
              "C:\Windows\SYSWOW64\calc.exe"
              2⤵
                PID:2592
            • C:\ProgramData\Google\Chrome\updater.exe
              C:\ProgramData\Google\Chrome\updater.exe
              1⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Drops file in Drivers directory
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Drops file in System32 directory
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:1332
              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                2⤵
                • Drops file in System32 directory
                • Modifies data under HKEY_USERS
                • Suspicious use of AdjustPrivilegeToken
                PID:2432
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop UsoSvc
                2⤵
                • Launches sc.exe
                PID:1888
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1764
                • C:\Windows\system32\wusa.exe
                  wusa /uninstall /kb:890830 /quiet /norestart
                  3⤵
                    PID:1936
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop WaaSMedicSvc
                  2⤵
                  • Launches sc.exe
                  PID:2856
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop wuauserv
                  2⤵
                  • Launches sc.exe
                  PID:1564
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop bits
                  2⤵
                  • Launches sc.exe
                  PID:1584
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop dosvc
                  2⤵
                  • Launches sc.exe
                  PID:4144
                • C:\Windows\system32\powercfg.exe
                  C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4348
                • C:\Windows\system32\conhost.exe
                  C:\Windows\system32\conhost.exe
                  2⤵
                    PID:2592
                  • C:\Windows\explorer.exe
                    explorer.exe
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:848
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3748
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4652
                  • C:\Windows\system32\powercfg.exe
                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                    2⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1600
                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                  C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Suspicious use of WriteProcessMemory
                  PID:2348
                  • C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:1184
                  • C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:3068
                  • C:\Users\Admin\AppData\Local\Temp\1000348001\987123.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000348001\987123.exe"
                    2⤵
                    • Executes dropped EXE
                    • Checks SCSI registry key(s)
                    PID:220
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 456
                      3⤵
                      • Program crash
                      PID:2892
                  • C:\Windows\SysWOW64\rundll32.exe
                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                    2⤵
                    • Loads dropped DLL
                    PID:3392
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                      3⤵
                      • Loads dropped DLL
                      PID:3692
                      • C:\Windows\system32\netsh.exe
                        netsh wlan show profiles
                        4⤵
                          PID:632
                    • C:\Users\Admin\AppData\Local\Temp\1000352001\lolololoMRK123.exe
                      "C:\Users\Admin\AppData\Local\Temp\1000352001\lolololoMRK123.exe"
                      2⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3368
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        3⤵
                          PID:1596
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1204
                            4⤵
                            • Program crash
                            PID:1100
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                          3⤵
                            PID:4456
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          2⤵
                          • Loads dropped DLL
                          PID:4912
                        • C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe
                          "C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe"
                          2⤵
                          • Executes dropped EXE
                          PID:4152
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe delete "FLWCUERA"
                            3⤵
                            • Launches sc.exe
                            PID:1788
                          • C:\Windows\system32\sc.exe
                            C:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"
                            3⤵
                            • Launches sc.exe
                            PID:4616
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe"
                            3⤵
                              PID:5032
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe start "FLWCUERA"
                              3⤵
                              • Launches sc.exe
                              PID:3612
                            • C:\Windows\system32\sc.exe
                              C:\Windows\system32\sc.exe stop eventlog
                              3⤵
                              • Launches sc.exe
                              PID:1388
                          • C:\Users\Admin\AppData\Local\Temp\1000356001\Amadey.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000356001\Amadey.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:3700
                          • C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe
                            "C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe"
                            2⤵
                            • Executes dropped EXE
                            PID:1332
                            • C:\Users\Admin\AppData\Local\Temp\nine.exe
                              "C:\Users\Admin\AppData\Local\Temp\nine.exe"
                              3⤵
                                PID:1880
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 448
                                  4⤵
                                  • Program crash
                                  PID:3644
                            • C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe
                              "C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe"
                              2⤵
                              • Executes dropped EXE
                              PID:4300
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 220 -ip 220
                            1⤵
                              PID:2100
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1880 -ip 1880
                              1⤵
                                PID:2092
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1596 -ip 1596
                                1⤵
                                  PID:4084

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\ProgramData\Google\Chrome\updater.exe

                                  Filesize

                                  6.1MB

                                  MD5

                                  6db28a72425aad28b2ab0227f974abb9

                                  SHA1

                                  86080f324b98f3d2f35e60e748c6f49df9f53571

                                  SHA256

                                  9278b5f0370de855cd77413fa348198d1383906bd512831373cc30c302052e27

                                  SHA512

                                  d08b295fb84e0177ee99dc35af47770a6ead16ac3f295cc77a6913695d9b665092e9bba9e1469b81befd403691666bd59116c9cc24a3e877cddee87869d135b3

                                • C:\ProgramData\Google\Chrome\updater.exe

                                  Filesize

                                  5.9MB

                                  MD5

                                  ae4ead49655e1d18c5da7febe1fb88fb

                                  SHA1

                                  8bd6e768c408df3308b563caaefa49b42c9e30c1

                                  SHA256

                                  fcecb9a5acd25767308f135a66155f1db428b2b70b0c5c25aa200abf40847089

                                  SHA512

                                  6a7f9ec7f4902a4b357f3a0606bf34985595a2243bc6fbe319e2567a1e712465a26fcf2bf4a267169d56260cdc0ed1a08ecbd83014ef2f7b8a73b8198eec01b0

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                                  Filesize

                                  52KB

                                  MD5

                                  ebd8f90406c4820902162e3156b1ecb4

                                  SHA1

                                  f909f010552a1471b7a2417d3a954d92dcf44833

                                  SHA256

                                  414b2bf1e0c76689465539ace0fce226ce6ef8619db64799b2b5c60f78b3cb4b

                                  SHA512

                                  7bfe96a23a31e9d089dbf8e945c9f562aed86377bf22da17f0fd6760d99edb4c85b8cbe5d3eedb31619da90f78382738141b4615a1d6519c0085c6ea5396eb98

                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                  Filesize

                                  18KB

                                  MD5

                                  1603885d4019d1c16d658477cf6cb705

                                  SHA1

                                  58ba542b4dbb1207dd216ae2855ada0b39f900cd

                                  SHA256

                                  0d93565b70865eee660f6487e3f365b2fded63d3316eddfa503ae0caf2ffb0b4

                                  SHA512

                                  de2174621da682219a8dee8e285183f6acb9529ea0aad6da905618df76f9b93d5c734b5bcfa7c5ec6e060a5814eab023c666ac5d16d20ac24711611db1cdf55c

                                • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe

                                  Filesize

                                  256KB

                                  MD5

                                  4a34f44a83fd7bf93a2e1028322d2c33

                                  SHA1

                                  e6bbb2754124632b4d7786feda9be6c02bf801e5

                                  SHA256

                                  56946eb6c17ec4ef7eef9bf709b0068f4038a5f932bf1cc1bab2fda0e3eedc2f

                                  SHA512

                                  d47f549294e67df5246d6a8b39d4e891d83abf28e90674d8f3f0465bbcedf6284404d8d6ee11719a58ddf7fb0e50f187a45fd7fc7030c416317132ffea55c216

                                • C:\Users\Admin\AppData\Local\Temp\1000342001\rdp1234.exe

                                  Filesize

                                  313KB

                                  MD5

                                  5275388736eab08ff9dd1bc294293888

                                  SHA1

                                  ccacd0707c9f7f6a4640e160837fb31dc80d1b4d

                                  SHA256

                                  399157d897d300ca1a761f7130a082fa0ed414f195a47d87b290c66c3c046164

                                  SHA512

                                  6ce7825d4d8dfd6a981ba24822bfa6583075f0d6ce0892818670204f63765b8cefdb4a5647c50a50cdc990e0207349f6a6c12e4d8c58e17fc63107a2ec62df46

                                • C:\Users\Admin\AppData\Local\Temp\1000345001\new.exe

                                  Filesize

                                  313KB

                                  MD5

                                  f7df4f6867414bb68132b8815f010e4a

                                  SHA1

                                  ff3b43447568de645671afb2214b26901ad7a4fc

                                  SHA256

                                  2c9490406c7ea631dddcd60f862445faef37c036651636e4bf5e6fe0837c4b42

                                  SHA512

                                  0ad9b1544c25ae7814fe1ecdb1cfd466fd14603a6d55749e63ce6b90926ad239f134aef1bcaa0910b79235b8a3873ad11698e17dbd0cfee92fb909f4daf0412e

                                • C:\Users\Admin\AppData\Local\Temp\1000348001\987123.exe

                                  Filesize

                                  259KB

                                  MD5

                                  e26913404749c554b79a30e7ce21bc07

                                  SHA1

                                  3e377b1e6169929fb2580dbdedbc8e438e1982f8

                                  SHA256

                                  5b409b4f077ff10e89c346a8430eeefed204dc3be9f5873cf7e96e2c261b4e56

                                  SHA512

                                  599efc2bbefd71973df50f3eba11d8af4ef9f935dda8b780a843f999c04d303ecada23b692392ac54b38246826bc48d7151da52742f5d86020669f12043f5373

                                • C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe

                                  Filesize

                                  1.9MB

                                  MD5

                                  30a6e6f5f566cc53c4a1a13a4a53d10f

                                  SHA1

                                  c04381a0ad9e2961c1d59bfdff8f336bb625de1d

                                  SHA256

                                  7e7820c44d1d0874657a09ff4a0780de1fb39a5695aae416f0f3aba1cac72b6d

                                  SHA512

                                  d405ea734fa0d427736319657219f829ff4e329321ee0b43c9d9a9229d5aab923e7d8cffc39e9da08a42920e213bb9913797a223390d355914c051e2c488dba6

                                • C:\Users\Admin\AppData\Local\Temp\1000351001\redline1234min.exe

                                  Filesize

                                  832KB

                                  MD5

                                  774510bcff294f80e47a210a19483749

                                  SHA1

                                  0de009eca6fe604d132b052a424479b76ca72448

                                  SHA256

                                  207e61d940900c1a17cc112b66072482aa0f11d4933f0387bf9d9b8f6487f955

                                  SHA512

                                  076c64b82bf55e174f2283829292f5a21c072f57fa107900f9f013f82e94c833264e4cfe5a83d81830162d054b35c21f67778dcf25f7fadd6168d70b0b511741

                                • C:\Users\Admin\AppData\Local\Temp\1000352001\lolololoMRK123.exe

                                  Filesize

                                  698KB

                                  MD5

                                  bf2a3e48b0ea897e1cb01f8e2d37a995

                                  SHA1

                                  4e7cd01f8126099d550e126ff1c44b9f60f79b70

                                  SHA256

                                  207c4f9e62528d693f096220ad365f5124918efc7994c537c956f9a79bcbadd3

                                  SHA512

                                  78769b0130eed100e2bb1d0794f371b0fa1286d0c644337bc2d9bbe24f6467fd89aa8acf92ac719cc3c045d57097665fe8f3f567f2d4297a7ee7968bbab58b91

                                • C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  0dbe60b960cb82126c9de613b492995e

                                  SHA1

                                  c25f2d7ff45b1fedce9d415f27f686fee5c4f74b

                                  SHA256

                                  97b011dbe6df95547690cf9ec362667bcfdb5bd4270a45d1fded8f2f53b5a063

                                  SHA512

                                  4785c6010d145ea2d4661d6ce3335273873758333095c0ea71a3d99a27bb698f16dc148842a03dda1638cc04f1e1d1b1b381f6e47b496db02e26e789aa100f7f

                                • C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe

                                  Filesize

                                  576KB

                                  MD5

                                  82015b3dd714a746f75118030a72fca8

                                  SHA1

                                  12f0c180919502e54f72415b21aece9490acd553

                                  SHA256

                                  8468466e4b0e30f22bc97415dff2e568a663d28f37c4066fc50b32894383636b

                                  SHA512

                                  d6e0b968254912881227d274b378aa51d06334b28daa1676bdadfbe26a840fb22cbd6293faab24b2cca694251f8b7223820367027a132bd4b00c38019b7e9ebb

                                • C:\Users\Admin\AppData\Local\Temp\1000353001\dayroc.exe

                                  Filesize

                                  448KB

                                  MD5

                                  e93c6697448789944529cfbd991b7652

                                  SHA1

                                  1c5229b820c6b0be0cb46d1a98b8d3746d0820b0

                                  SHA256

                                  7bbeb235fef221be83e0fa4a91a769d2b887530124fe48069fc4cefab5dab1bf

                                  SHA512

                                  c4a75b1d3fdae2798831624f22f4b1fde9ce07c411e3d3dff8046450364d2817c4d55a1158656400d4566300f2ab588028e856c59526fad7d793a63a0e0e12c9

                                • C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe

                                  Filesize

                                  1.1MB

                                  MD5

                                  85c0cb6d016a43fd0469e65a87a65cd1

                                  SHA1

                                  e5a8db7e2511a9595de4527f033a2937d35fa353

                                  SHA256

                                  bba117e10d09311d2283f1ec4317ed215d4cb96b23f30127681ba20ac3f31b84

                                  SHA512

                                  bda0c0d361846d4764238f2d9a59e93fda2189ea8a8baa9ab861ecf7d155cbeec56dbf549b5cbbb3f300122ab290ba6d7117997ed37a605436aff5d7e58829c7

                                • C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe

                                  Filesize

                                  704KB

                                  MD5

                                  142ebf77a7daa4e25a00e48158a59552

                                  SHA1

                                  1ec566431e9a1443c1857111fa3a9d4bdc009baa

                                  SHA256

                                  9eec3a8fec4616f21747bcfe3f7e6ca0ee0f37758ffe594aa351d11942fd6e67

                                  SHA512

                                  be882bff27700cbfa923200f8664f7270998f1346b8de04498b2ff1171e27c5ddb7fb79e894719a42278158bfbcde5e82b4eeece49dc3e5265d7818b8a973e1c

                                • C:\Users\Admin\AppData\Local\Temp\1000354001\for.exe

                                  Filesize

                                  1.6MB

                                  MD5

                                  8c281571c5fdaf40aa847d90e5a81075

                                  SHA1

                                  041fa6e79e9027350c1f241375687de7f8cba367

                                  SHA256

                                  0182e73c39240c0e660bbdd4262209f08d767562d4794b7ed5e36a4d4f36b409

                                  SHA512

                                  b0e481681b02e4cc4f95deff2fa21354f94ad34e6611d97de3a127ae285038164df724f3db27bbf03caa217c3d8dabf77bfdadeaf9af8a1915edacbd35c1c862

                                • C:\Users\Admin\AppData\Local\Temp\1000356001\Amadey.exe

                                  Filesize

                                  413KB

                                  MD5

                                  d467222c3bd563cb72fa49302f80b079

                                  SHA1

                                  9335e2a36abb8309d8a2075faf78d66b968b2a91

                                  SHA256

                                  fedb08b3ec7034a15e9dee7ed4dec1a854fb78e74285e1ee05c90f9e9e4f8b3e

                                  SHA512

                                  484b6c427e28193ddb73dd7062e2bfbd132ddc72ce4811bfe08784669de30e4b92bc27140373f62a4ce651401000a3c505188620c43da410bf6b0799a0791fa7

                                • C:\Users\Admin\AppData\Local\Temp\29AD.exe

                                  Filesize

                                  6.3MB

                                  MD5

                                  b1e8d4d7dd26612c17eccbf66b280e7c

                                  SHA1

                                  97dd5e81a4014fb54ef5ac3f1db88519843c85c2

                                  SHA256

                                  e3940372b04a4cb2177ae409c195debccfe004600d73a39d429a577d248d4cb2

                                  SHA512

                                  ff70dd3103128cd36bd1da3a734e635ec76d53a5629fc1f05941d6cadb9e82310da0ea298dcf449ef17c42a70ea7d787a75585ffa37a74f9007ca91a4481ecc8

                                • C:\Users\Admin\AppData\Local\Temp\34CB.exe

                                  Filesize

                                  535KB

                                  MD5

                                  c85359e6fcc2b3aad2407a8769d8d1f1

                                  SHA1

                                  77adb2c84465aeef9ef0f8ddb12b0165610b57da

                                  SHA256

                                  8934e11fa9c967fe8e67d9fc1c1f518f18c107b6abc91b143e03e5b18f892782

                                  SHA512

                                  2f3c97978972293ca5a17838d173ad4554731edcc12e848bc27063a13ed5ca9bf0b8483f247891cf97be83e531ddab011d3c2b8156c92da8ec56a1a0b4c033a3

                                • C:\Users\Admin\AppData\Local\Temp\5312.exe

                                  Filesize

                                  1.8MB

                                  MD5

                                  01cc26ecbfdeebceb71a8164da05fef3

                                  SHA1

                                  2bcadbcc1329fde8d7eb7b4ddee33a9690715b0a

                                  SHA256

                                  b8c3dd017ddb8ea416e886acf134b17e91c44b8ccc1eec03f760bb4b328ab00f

                                  SHA512

                                  006da3cbcca6bebfa82bb6d6d046e1a9a9a5bf8346bbc5ce30c1eb8b8249b930f9aaf8bbf92058183529e31827a8504f8f6b3710c0bb3e6a8a02b888e6766bb1

                                • C:\Users\Admin\AppData\Local\Temp\5A95.exe

                                  Filesize

                                  63KB

                                  MD5

                                  cbfbeaf0a6e70056f43406053cd61f1e

                                  SHA1

                                  b7088a9f29b8ab84aedaffec81441580775d5393

                                  SHA256

                                  fa776a4e5e0653f7856a19c3a9fbdad306eb9365cb553bc223d8075be5f5cd3b

                                  SHA512

                                  2930b11123191108d66e1bba5cb43f34ca963c424f6dd9c61751db62cef3039773dd100c179909d30099953513ca6eb07e29732af7928d2602c35a8020271c5c

                                • C:\Users\Admin\AppData\Local\Temp\DF06.bat

                                  Filesize

                                  77B

                                  MD5

                                  55cc761bf3429324e5a0095cab002113

                                  SHA1

                                  2cc1ef4542a4e92d4158ab3978425d517fafd16d

                                  SHA256

                                  d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                                  SHA512

                                  33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                                • C:\Users\Admin\AppData\Local\Temp\FDAA.exe

                                  Filesize

                                  2.4MB

                                  MD5

                                  7ea4ead4fc9c5c7a9f3309cab716a28f

                                  SHA1

                                  b5457c2c7529585e02dac132b5adeed3a4f1f260

                                  SHA256

                                  431452b0cb6b0ee3d623c3394b120b104e24826585530708942690eeba34055a

                                  SHA512

                                  f6ca00aa0331da628514f982a4627c338c1c9f29a70146c7324e9212f73487a1a146a93f438be93f13cf08574da73769bdfefdbb02b689ffa6d8fc98a6993d1b

                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_czfzhqyu.ial.ps1

                                  Filesize

                                  60B

                                  MD5

                                  d17fe0a3f47be24a6453e9ef58c94641

                                  SHA1

                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                  SHA256

                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                  SHA512

                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                • C:\Users\Admin\AppData\Local\Temp\filename.exe

                                  Filesize

                                  7.9MB

                                  MD5

                                  c7360f031893f764c09c12d1a93bb6b3

                                  SHA1

                                  ed7645fce92872be3668dd38da104ec0c5648213

                                  SHA256

                                  3c1b63ce143c1979f3d963fd3ed0d838bc231c1d2fcb02a965c7230ef94dc899

                                  SHA512

                                  6924d9f34c317bd45008446bef35a4ef9da1f985cc213ad32d29d5f1dceaef0b3f73b07eec6d489e561711ff6cbb7e99ea110d345d89f571ad3ca4852381f413

                                • C:\Users\Admin\AppData\Local\Temp\filename.exe

                                  Filesize

                                  7.9MB

                                  MD5

                                  2761e9ab32da9b30a51245fd1b834acf

                                  SHA1

                                  a2f9eac56e43635fc3c8f26e4ea5f2ea8d70bcfc

                                  SHA256

                                  5ee91e1319962f87ec141dcee055d6da4d9394605aa455105163f4e55087263e

                                  SHA512

                                  886383a465a9fdfa840a1e4f40573b14ff19b1a8692e4fab5e3de9196067ecceb03a65e9a08b5707d14effa750f15dff7ea8ea76a29359bbc6f8e898711014aa

                                • C:\Users\Admin\AppData\Local\Temp\nine.exe

                                  Filesize

                                  257KB

                                  MD5

                                  9377b2d9cf30cdb95938581d2f443d0c

                                  SHA1

                                  5b2d23dea7d5f7deded14b1f33e08260b9c25878

                                  SHA256

                                  1b045d664cd5ce2bf315bffef85f0b4be363bd6d146533e3c3624257122330e9

                                  SHA512

                                  4278f05d7da33465332fe62b8a9f1e01717f99a3b7e8f7769ec62947b9aca924228575087a035bcc064f816e4b58ff28bc7ba0cc84545ebbe8cc0d69b7ca7f0e

                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                  Filesize

                                  109KB

                                  MD5

                                  2afdbe3b99a4736083066a13e4b5d11a

                                  SHA1

                                  4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                  SHA256

                                  8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                  SHA512

                                  d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                  MD5

                                  d41d8cd98f00b204e9800998ecf8427e

                                  SHA1

                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                  SHA256

                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                  SHA512

                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                  Filesize

                                  64KB

                                  MD5

                                  a21ba51320e246460cd10fd9d940ca1f

                                  SHA1

                                  253437834f3537debd72664218c2bb077f07b3a8

                                  SHA256

                                  85f872e7dc95829e4fb98c1932b1f704124ab476278e2c665978859236209a98

                                  SHA512

                                  02cc643f962517da3694e2e523eb7a552b18fcad9865cafa64ac6de6af55cf14cacc75d35caca5539a0405a4ca23cde662c56fa990e5b7adf096355a788025bb

                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                  Filesize

                                  1.2MB

                                  MD5

                                  92fbdfccf6a63acef2743631d16652a7

                                  SHA1

                                  971968b1378dd89d59d7f84bf92f16fc68664506

                                  SHA256

                                  b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                  SHA512

                                  b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\qemu-ga.exe

                                  Filesize

                                  4KB

                                  MD5

                                  a5ce3aba68bdb438e98b1d0c70a3d95c

                                  SHA1

                                  013f5aa9057bf0b3c0c24824de9d075434501354

                                  SHA256

                                  9b860be98a046ea97a7f67b006e0b1bc9ab7731dd2a0f3a9fd3d710f6c43278a

                                  SHA512

                                  7446f1256873b51a59b9d2d3498cef5a41dbce55864c2a5fb8cb7d25f7d6e6d8ea249d551a45b75d99b1ad0d6fb4b5e4544e5ca77bcd627717d6598b5f566a79

                                • C:\Windows\system32\drivers\etc\hosts

                                  Filesize

                                  3KB

                                  MD5

                                  2d29fd3ae57f422e2b2121141dc82253

                                  SHA1

                                  c2464c857779c0ab4f5e766f5028fcc651a6c6b7

                                  SHA256

                                  80a60d7ec533d820de20bcedeb41319e7b1def548b6ea73ddbd69455bac4e7a4

                                  SHA512

                                  077a5c554663be7b71f181d961f5c98c732bc296dc015ffee30768a648bee3aad62c39c352cf2947432be19519906aeac7dfaf2557d309bb460732abb7fdbc68

                                • memory/760-92-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/760-121-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/760-95-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/760-116-0x0000000006AA0000-0x0000000006BBA000-memory.dmp

                                  Filesize

                                  1.1MB

                                • memory/760-93-0x0000000002F20000-0x0000000002F3A000-memory.dmp

                                  Filesize

                                  104KB

                                • memory/760-108-0x0000000005B00000-0x0000000005B10000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/760-91-0x0000000000D40000-0x0000000000D54000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/804-129-0x0000000005CC0000-0x0000000005CE2000-memory.dmp

                                  Filesize

                                  136KB

                                • memory/804-124-0x0000000002B60000-0x0000000002B96000-memory.dmp

                                  Filesize

                                  216KB

                                • memory/804-125-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/804-126-0x0000000002AF0000-0x0000000002B00000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/804-127-0x0000000005690000-0x0000000005CB8000-memory.dmp

                                  Filesize

                                  6.2MB

                                • memory/804-135-0x0000000005DA0000-0x0000000005E06000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/804-140-0x0000000006010000-0x0000000006364000-memory.dmp

                                  Filesize

                                  3.3MB

                                • memory/848-372-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-386-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-479-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-347-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-348-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-349-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-351-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-478-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-367-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-477-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-476-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-449-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-356-0x0000000001780000-0x00000000017A0000-memory.dmp

                                  Filesize

                                  128KB

                                • memory/848-355-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-375-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-371-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-352-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-369-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/848-354-0x0000000140000000-0x0000000140848000-memory.dmp

                                  Filesize

                                  8.3MB

                                • memory/1332-250-0x00007FF752920000-0x00007FF753673000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/1332-256-0x00007FF752920000-0x00007FF753673000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/1332-293-0x00007FF752920000-0x00007FF753673000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/1332-253-0x00007FF752920000-0x00007FF753673000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/1332-350-0x00007FF752920000-0x00007FF753673000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/1596-534-0x0000000000400000-0x000000000048A000-memory.dmp

                                  Filesize

                                  552KB

                                • memory/1656-100-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-101-0x0000000004E90000-0x0000000004E91000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-114-0x0000000000D40000-0x00000000011ED000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1656-105-0x0000000004F10000-0x0000000004F11000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-104-0x0000000004F20000-0x0000000004F21000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-102-0x0000000004EA0000-0x0000000004EA1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-84-0x0000000000D40000-0x00000000011ED000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1656-94-0x0000000077DE4000-0x0000000077DE6000-memory.dmp

                                  Filesize

                                  8KB

                                • memory/1656-97-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-96-0x0000000000D40000-0x00000000011ED000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/1656-98-0x0000000004ED0000-0x0000000004ED1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1656-99-0x0000000004EB0000-0x0000000004EB1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2040-3-0x0000000000400000-0x0000000002BE4000-memory.dmp

                                  Filesize

                                  39.9MB

                                • memory/2040-2-0x0000000004930000-0x000000000493B000-memory.dmp

                                  Filesize

                                  44KB

                                • memory/2040-1-0x0000000002E40000-0x0000000002F40000-memory.dmp

                                  Filesize

                                  1024KB

                                • memory/2040-5-0x0000000000400000-0x0000000002BE4000-memory.dmp

                                  Filesize

                                  39.9MB

                                • memory/2288-196-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2288-244-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2288-171-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2288-174-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2288-175-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2288-190-0x00007FF622AD0000-0x00007FF623823000-memory.dmp

                                  Filesize

                                  13.3MB

                                • memory/2348-425-0x0000000000FB0000-0x000000000145D000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2348-503-0x0000000000FB0000-0x000000000145D000-memory.dmp

                                  Filesize

                                  4.7MB

                                • memory/2592-342-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2592-343-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2592-122-0x0000000002C50000-0x0000000002C59000-memory.dmp

                                  Filesize

                                  36KB

                                • memory/2592-118-0x0000000000400000-0x000000000043D000-memory.dmp

                                  Filesize

                                  244KB

                                • memory/2592-120-0x0000000000400000-0x000000000043D000-memory.dmp

                                  Filesize

                                  244KB

                                • memory/2592-117-0x0000000000400000-0x000000000043D000-memory.dmp

                                  Filesize

                                  244KB

                                • memory/2592-337-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2592-339-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2592-338-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/2592-123-0x0000000002C80000-0x0000000002C8D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/2592-345-0x0000000140000000-0x000000014000E000-memory.dmp

                                  Filesize

                                  56KB

                                • memory/3192-56-0x0000000002630000-0x0000000002640000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3192-53-0x0000000002630000-0x0000000002640000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3192-76-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3192-51-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3192-59-0x0000000002630000-0x0000000002640000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3192-49-0x0000000002640000-0x00000000026AC000-memory.dmp

                                  Filesize

                                  432KB

                                • memory/3192-57-0x0000000005250000-0x00000000052BA000-memory.dmp

                                  Filesize

                                  424KB

                                • memory/3192-75-0x0000000002860000-0x0000000004860000-memory.dmp

                                  Filesize

                                  32.0MB

                                • memory/3420-4-0x0000000002ED0000-0x0000000002EE6000-memory.dmp

                                  Filesize

                                  88KB

                                • memory/3752-68-0x0000000005710000-0x000000000574C000-memory.dmp

                                  Filesize

                                  240KB

                                • memory/3752-83-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3752-109-0x0000000006ED0000-0x0000000006F20000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/3752-31-0x0000000000D80000-0x0000000000DD4000-memory.dmp

                                  Filesize

                                  336KB

                                • memory/3752-35-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/3752-69-0x0000000005890000-0x00000000058DC000-memory.dmp

                                  Filesize

                                  304KB

                                • memory/3752-62-0x0000000005780000-0x000000000588A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/3752-36-0x0000000005A90000-0x0000000006034000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/3752-65-0x00000000056B0000-0x00000000056C2000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/3752-39-0x0000000005400000-0x0000000005492000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/3752-43-0x0000000005650000-0x0000000005660000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3752-89-0x0000000005650000-0x0000000005660000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/3752-55-0x00000000054C0000-0x00000000054CA000-memory.dmp

                                  Filesize

                                  40KB

                                • memory/3752-61-0x0000000006660000-0x0000000006C78000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/3872-54-0x0000000002FE0000-0x0000000002FE1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-66-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-58-0x0000000000130000-0x0000000000F5B000-memory.dmp

                                  Filesize

                                  14.2MB

                                • memory/3872-63-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-52-0x0000000002FD0000-0x0000000002FD1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-64-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-67-0x0000000002FF0000-0x0000000002FF1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-78-0x0000000000130000-0x0000000000F5B000-memory.dmp

                                  Filesize

                                  14.2MB

                                • memory/3872-44-0x0000000000130000-0x0000000000F5B000-memory.dmp

                                  Filesize

                                  14.2MB

                                • memory/3872-48-0x0000000002FB0000-0x0000000002FB1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-50-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-45-0x00000000015C0000-0x00000000015C1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-47-0x0000000002F80000-0x0000000002F81000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/3872-46-0x00000000015D0000-0x00000000015D1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/4328-128-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4328-112-0x0000000007C10000-0x0000000007DD2000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4328-115-0x0000000008310000-0x000000000883C000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4328-107-0x0000000005E30000-0x0000000005E4E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4328-77-0x00000000752D0000-0x0000000075A80000-memory.dmp

                                  Filesize

                                  7.7MB

                                • memory/4328-72-0x0000000000400000-0x0000000000462000-memory.dmp

                                  Filesize

                                  392KB

                                • memory/4328-103-0x0000000005F70000-0x0000000005FE6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4328-90-0x0000000005270000-0x00000000052D6000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4424-34-0x00007FF6E50B0000-0x00007FF6E537E000-memory.dmp

                                  Filesize

                                  2.8MB

                                • memory/4424-26-0x00007FF6E50B0000-0x00007FF6E537E000-memory.dmp

                                  Filesize

                                  2.8MB