Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29-03-2024 00:57

General

  • Target

    d6a993c484df2f0c2e856ff6851746cd9739305feb4238d97eac4b929d86b1f3.exe

  • Size

    261KB

  • MD5

    da005f97decc17e384fc4fbff28b1427

  • SHA1

    866f3b7902191d6d3a147e3203c48ef3f66cade1

  • SHA256

    d6a993c484df2f0c2e856ff6851746cd9739305feb4238d97eac4b929d86b1f3

  • SHA512

    1060c51159656177428d7134698ddb6c51b586611aa18105d1393bbdd91bcfb1f7d21e9fdea8afe89c6d9f12e2fcbd76c4c4b27bc1773ced6ea0f392c6b5b19a

  • SSDEEP

    3072:1EYrkvHJWF7O5EM6d+/fkaNcwvYJmxmWZXFrlP1A4O3twfUrGPP4E+2DuETbyX1Z:1EkAHJn2/QkAx3TrlPytwfbX4E+2vTw

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshingmail.top Reserve e-mail address to contact us: datarestorehelpyou@airmail.cc Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.0:29587

Extracted

Family

vidar

Version

8.6

Botnet

5739ef2bbcd39fcd59c5746bfe4238c5

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    5739ef2bbcd39fcd59c5746bfe4238c5

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Signatures

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Glupteba payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 21 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 8 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 61 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6a993c484df2f0c2e856ff6851746cd9739305feb4238d97eac4b929d86b1f3.exe
    "C:\Users\Admin\AppData\Local\Temp\d6a993c484df2f0c2e856ff6851746cd9739305feb4238d97eac4b929d86b1f3.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4492
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9B46.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:4700
    • C:\Users\Admin\AppData\Local\Temp\AF0D.exe
      C:\Users\Admin\AppData\Local\Temp\AF0D.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\AF0D.exe
        C:\Users\Admin\AppData\Local\Temp\AF0D.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\fe991681-387f-47ed-aef3-b0629d1e74a5" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:2408
        • C:\Users\Admin\AppData\Local\Temp\AF0D.exe
          "C:\Users\Admin\AppData\Local\Temp\AF0D.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3980
          • C:\Users\Admin\AppData\Local\Temp\AF0D.exe
            "C:\Users\Admin\AppData\Local\Temp\AF0D.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:1076
            • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build2.exe
              "C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4968
              • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build2.exe
                "C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build2.exe"
                6⤵
                • Executes dropped EXE
                PID:4168
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 2124
                  7⤵
                  • Program crash
                  PID:2208
            • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build3.exe
              "C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:3116
              • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build3.exe
                "C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build3.exe"
                6⤵
                • Executes dropped EXE
                PID:4788
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:2856
    • C:\Users\Admin\AppData\Local\Temp\B940.exe
      C:\Users\Admin\AppData\Local\Temp\B940.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 848
        2⤵
        • Program crash
        PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1936 -ip 1936
      1⤵
        PID:3120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4168 -ip 4168
        1⤵
          PID:4704
        • C:\Users\Admin\AppData\Local\Temp\D285.exe
          C:\Users\Admin\AppData\Local\Temp\D285.exe
          1⤵
          • Executes dropped EXE
          PID:1204
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D4E8.bat" "
          1⤵
            PID:4496
            • C:\Windows\system32\reg.exe
              reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
              2⤵
                PID:3392
            • C:\Users\Admin\AppData\Local\Temp\FD41.exe
              C:\Users\Admin\AppData\Local\Temp\FD41.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              PID:4616
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                2⤵
                  PID:5088
              • C:\Users\Admin\AppData\Local\Temp\938.exe
                C:\Users\Admin\AppData\Local\Temp\938.exe
                1⤵
                • Executes dropped EXE
                PID:540
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5108
                • C:\Users\Admin\AppData\Local\Temp\938.exe
                  "C:\Users\Admin\AppData\Local\Temp\938.exe"
                  2⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  PID:2060
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:3796
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    3⤵
                      PID:3468
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        4⤵
                        • Modifies Windows Firewall
                        PID:4940
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:3608
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:4904
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Manipulates WinMonFS driver.
                      • Drops file in Windows directory
                      PID:4484
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:4288
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:3564
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        4⤵
                          PID:4736
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:3308
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:3016
                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                          4⤵
                          • Executes dropped EXE
                          PID:4668
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          4⤵
                          • DcRat
                          • Creates scheduled task(s)
                          PID:4420
                          • C:\Windows\System32\Conhost.exe
                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            5⤵
                              PID:3468
                          • C:\Windows\windefender.exe
                            "C:\Windows\windefender.exe"
                            4⤵
                            • Executes dropped EXE
                            PID:4756
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                              5⤵
                                PID:4180
                                • C:\Windows\SysWOW64\sc.exe
                                  sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                  6⤵
                                  • Launches sc.exe
                                  PID:4548
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                        • Modifies Installed Components in the registry
                        • Enumerates connected drives
                        • Checks SCSI registry key(s)
                        • Modifies registry class
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:408
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:3712
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:3540
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:1708
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          2⤵
                          • Executes dropped EXE
                          PID:4752
                          • C:\Windows\SysWOW64\schtasks.exe
                            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                            3⤵
                            • DcRat
                            • Creates scheduled task(s)
                            PID:4748
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:3472
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:4156
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:660
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:3480
                      • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                        "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                        1⤵
                        • Enumerates system info in registry
                        • Modifies Internet Explorer settings
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:4476
                      • C:\Windows\windefender.exe
                        C:\Windows\windefender.exe
                        1⤵
                        • Executes dropped EXE
                        • Modifies data under HKEY_USERS
                        PID:4304
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        1⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:5108
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          2⤵
                          • Executes dropped EXE
                          PID:540

                      Network

                      MITRE ATT&CK Matrix ATT&CK v13

                      Execution

                      Scheduled Task/Job

                      1
                      T1053

                      Persistence

                      Boot or Logon Autostart Execution

                      2
                      T1547

                      Registry Run Keys / Startup Folder

                      2
                      T1547.001

                      Create or Modify System Process

                      1
                      T1543

                      Windows Service

                      1
                      T1543.003

                      Scheduled Task/Job

                      1
                      T1053

                      Privilege Escalation

                      Boot or Logon Autostart Execution

                      2
                      T1547

                      Registry Run Keys / Startup Folder

                      2
                      T1547.001

                      Create or Modify System Process

                      1
                      T1543

                      Windows Service

                      1
                      T1543.003

                      Scheduled Task/Job

                      1
                      T1053

                      Defense Evasion

                      Modify Registry

                      3
                      T1112

                      Impair Defenses

                      1
                      T1562

                      Disable or Modify System Firewall

                      1
                      T1562.004

                      File and Directory Permissions Modification

                      1
                      T1222

                      Credential Access

                      Unsecured Credentials

                      3
                      T1552

                      Credentials In Files

                      3
                      T1552.001

                      Discovery

                      Query Registry

                      5
                      T1012

                      Peripheral Device Discovery

                      2
                      T1120

                      System Information Discovery

                      5
                      T1082

                      Collection

                      Data from Local System

                      3
                      T1005

                      Command and Control

                      Web Service

                      1
                      T1102

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                        Filesize

                        1KB

                        MD5

                        2a789d6b366b95c47c2e68c27f863f81

                        SHA1

                        1b123bd94179f5b8746bc960691ddb9546855e05

                        SHA256

                        ba4990d90cdd27ce932e39c10e178659436aeb5a290faa47f4825da9eca6bc94

                        SHA512

                        027180aabc65ae3ca35f83161b11d289d87af854656483ac2cf703d94f695c4d5bce0fce1901278ab4cbfc985c9b9aa1f455c889913834c4b1734a365c7f8e3b

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                        Filesize

                        724B

                        MD5

                        8202a1cd02e7d69597995cabbe881a12

                        SHA1

                        8858d9d934b7aa9330ee73de6c476acf19929ff6

                        SHA256

                        58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                        SHA512

                        97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                        Filesize

                        410B

                        MD5

                        1890cf344e205fbb171fcbd8434faac6

                        SHA1

                        2d53bace1803672f0768fdef32c989c2a9cd206f

                        SHA256

                        c35e18c3b31064ff1a49a2b8ce6e48db0fa954047e0efe4d45d821a948d2ec58

                        SHA512

                        fcfb2ca9635de4e50d30bf1152a7a2757cf1297d2c69716da8c956c0cff4ab01330a93e900a3580462f14ea9c54ec0adaa9b95519b2e62d8770f9076e042c15d

                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                        Filesize

                        392B

                        MD5

                        60698f607db474dabbce06dac975ca6b

                        SHA1

                        1aa29f66acdb0661666ee690961c7759033d7435

                        SHA256

                        7f2e79fef34a1f8e18cdfbcb77e18e4b97653be18fdcda0c5dbc0c0b6fbab72b

                        SHA512

                        3f822e80f8fd531e650b01b5ea24b2d9629f0719b2177e624b99d2940e364640258b338c2bec32e02faef7c4a1f307eff4c6eced8bb36c3566a5c5cac75cc4fd

                      • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build2.exe
                        Filesize

                        277KB

                        MD5

                        8dae8b6a6be6e3527183594d1c26a2d3

                        SHA1

                        b87e40cee60869a36e79c88c8a3a34baf0bc4889

                        SHA256

                        afce72cd3bc717c784962083066e3ede2b0aaadbe0908ec7360096c923774fa5

                        SHA512

                        0bf065700db647efba39a13a58242a595907e6c11885575cf0bdad9e23ab40583c8a6535464e46d75d075e20d88b7a6305a761df9da787fdc8728483dd48f96e

                      • C:\Users\Admin\AppData\Local\4324f6c4-bbdd-4bd6-b269-536709f75fab\build3.exe
                        Filesize

                        299KB

                        MD5

                        41b883a061c95e9b9cb17d4ca50de770

                        SHA1

                        1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                        SHA256

                        fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                        SHA512

                        cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                      • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
                        Filesize

                        1022B

                        MD5

                        8b49dcb57e60b0f3119fce871f5e4967

                        SHA1

                        ab8d426c87a29ce0d209cbb242d89cb3d7d0694b

                        SHA256

                        0249caa6faaf0444570c414191f87511d81f908f28217f7d0990c43e921684c2

                        SHA512

                        2ef7f7d74e1733792dd4a08bf6f9761de794bb9ca7808a84150ff81f65c5b1a2f8ee73c4e6d8ec43b90ff31513617bf44977c262156eb19a10412affcb66cb3d

                      • C:\Users\Admin\AppData\Local\Temp\938.exe
                        Filesize

                        4.1MB

                        MD5

                        e445c438749eab1cc57d98407a83875a

                        SHA1

                        4b67b8f084aaf3a7a89534b32beab4e5faef674d

                        SHA256

                        f5cb5ace2b7d35f46c14eb827cf041dba371d5b9b9c8c7ef8ca4af01faebab37

                        SHA512

                        1e338586df2dcf4a77f9605860e18c5feb6f0cdabf7165877a53996af944aac361a4ca1faa2cce791a0d1336458965888d05af495bb6e2faac6031ed3cd160d4

                      • C:\Users\Admin\AppData\Local\Temp\9B46.bat
                        Filesize

                        77B

                        MD5

                        55cc761bf3429324e5a0095cab002113

                        SHA1

                        2cc1ef4542a4e92d4158ab3978425d517fafd16d

                        SHA256

                        d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                        SHA512

                        33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                      • C:\Users\Admin\AppData\Local\Temp\AF0D.exe
                        Filesize

                        765KB

                        MD5

                        dd277656da71e458ef8b3fd0c38aa110

                        SHA1

                        e1d8f42dd12d963bf0ff97d4c4ed746f4e1d6952

                        SHA256

                        353279e064e6cf2cad364bdc718293082e5cbe9100ceefd706426858da37f14d

                        SHA512

                        1eaab883536a6a483a2d8c1506d2806c75e5000e0cd120f9a3b1ba42532b813af18e1f70be48d0b8baf3cd6daf236a961a11ff9947410ef535cc08cade499326

                      • C:\Users\Admin\AppData\Local\Temp\B940.exe
                        Filesize

                        392KB

                        MD5

                        89ec2c6bf09ed9a38bd11acb2a41cd1b

                        SHA1

                        408549982b687ca8dd5efb0e8b704a374bd8909d

                        SHA256

                        da1e155c46ca6b23409d059b6d85341c0b86c92d2c69dbda85eef3894313662d

                        SHA512

                        c565dbb25dd35ae8dce2a4cf15640053aca8b99c5c78db23648e6618ef316362b77142c6524b47089a7ea05632adee091ec5e82ed95aeb86d2331b8c5f8cc56a

                      • C:\Users\Admin\AppData\Local\Temp\D285.exe
                        Filesize

                        6.5MB

                        MD5

                        9e52aa572f0afc888c098db4c0f687ff

                        SHA1

                        ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                        SHA256

                        4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                        SHA512

                        d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                      • C:\Users\Admin\AppData\Local\Temp\FD41.exe
                        Filesize

                        30.6MB

                        MD5

                        ff35671d54d612772b0c22c141a3056e

                        SHA1

                        d005a27cd48556bf17eb9c2b43af49b67347cc0e

                        SHA256

                        2f625ea35f82332c639049c4a849f39cd2b74acb013880d156a2f647497c2512

                        SHA512

                        9a40a657f196036ef07c410db225f7a023f7299abc078cefd5d97489e7359ce9c640d72b98fedbf3f11ebaba1987b0acd5c7892b1ba5b5ae18709037df45790e

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_zkldutzz.ep0.ps1
                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                        Filesize

                        281KB

                        MD5

                        d98e33b66343e7c96158444127a117f6

                        SHA1

                        bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                        SHA256

                        5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                        SHA512

                        705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                        Filesize

                        2KB

                        MD5

                        ac4917a885cf6050b1a483e4bc4d2ea5

                        SHA1

                        b1c0a9f27bd21c6bbb8e9be70db8777b4a2a640f

                        SHA256

                        e39062a62c3c7617feeeff95ea8a0be51104a0d36f46e44eea22556fda74d8d9

                        SHA512

                        092c67a3ecae1d187cad72a8ea1ea37cb78a0cf79c2cd7fb88953e5990669a2e871267015762fd46d274badb88ac0c1d73b00f1df7394d89bed48a3a45c2ba3d

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                        Filesize

                        19KB

                        MD5

                        8ad1b412ad71d417178f10f3b69c1412

                        SHA1

                        8fa9c5e7906cf02da46c276570cd57857c3e2e6b

                        SHA256

                        c166f3792e8eed609ef37079a19c6d4542b7d4b43a001bfe90ee4bcface7de25

                        SHA512

                        f38fd58f581bc71c71b934d16a9824fe2162bbb531187463dd084c0a2307428ad6462ea4f330006372326b1a2999d90f1b22379f08bd5cef5e414befbc379bf8

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                        Filesize

                        19KB

                        MD5

                        66ae5c748b4864315bdc444b033b3990

                        SHA1

                        96b936a7bf1376158d380778d7e3367472b11397

                        SHA256

                        ceeb8ca7f9278e81c01f9e0d28b25e72a59036080dd06105d26c7dd308224c7a

                        SHA512

                        bdb6979597b43dacfcc89875299084570356ee11ea331c901fb96569a47c257942c795889fe2014d476e51173ba145a0411cf870989bc60d55ec043e3a5d1201

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                        Filesize

                        19KB

                        MD5

                        236942e5981ee4816dffa5bf972a1182

                        SHA1

                        fb882516074e9507e564fe80762b7fe713c2b902

                        SHA256

                        625f652d2abf53d65702265a84a317d40eeeb4876bee454c0a01cabce174a5bb

                        SHA512

                        d93bfeb570b91a091342d560e66702d24c8d29114bd2712cc575a6e7a066d47c42ab8543502187ba644aeebb105b07602ff6651db15f90a679c19e69a43198ec

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                        Filesize

                        19KB

                        MD5

                        38f0f509d1fe7d90b129520202ee5652

                        SHA1

                        95491367a6bd265ab405dc0f4ab85b49973dfaf5

                        SHA256

                        e41c4a3d56df0e1aea1516e5207792ab6884bd839d1ee3fa945057807c3066e4

                        SHA512

                        1a72b6c003953ea1b5f2a89baeb3c4e2601f500ba0b0e983cbf2de54b3211456af85272440dc03f3ca3b017152e0976d5a71accf9321cb7f8748e0c9a5403a39

                      • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                        Filesize

                        19KB

                        MD5

                        d3a94f30415311c60b2e5010e0c0b548

                        SHA1

                        0d093cb127089e5cf4b7963fc0bbbd664a2d7cee

                        SHA256

                        4c3cba4251de9b31729fbf72ea060c00f013a7665312af219470f2ec195d10cb

                        SHA512

                        f087037733be92fe73bf7376502d1d4ae80101181170e1ee7af635d410420c44a4df699705a2c3e0c3e7d43af5bd8a74948883ddd7ead38973604e9c1ba81ef5

                      • C:\Windows\windefender.exe
                        Filesize

                        2.0MB

                        MD5

                        8e67f58837092385dcf01e8a2b4f5783

                        SHA1

                        012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                        SHA256

                        166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                        SHA512

                        40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                      • memory/540-312-0x0000000000400000-0x0000000000ECD000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/660-449-0x000001C71FAD0000-0x000001C71FAF0000-memory.dmp
                        Filesize

                        128KB

                      • memory/1076-95-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-44-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-129-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-96-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-93-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-52-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-51-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-226-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-46-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1076-45-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/1204-142-0x0000000000820000-0x0000000001505000-memory.dmp
                        Filesize

                        12.9MB

                      • memory/1204-148-0x0000000000820000-0x0000000001505000-memory.dmp
                        Filesize

                        12.9MB

                      • memory/1204-183-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-182-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-181-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-198-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-180-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-199-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-179-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-184-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-177-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-176-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-197-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-196-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-195-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-194-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-193-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-175-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-174-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-192-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-173-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-188-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-172-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-149-0x0000000003620000-0x0000000003621000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-150-0x0000000003650000-0x0000000003651000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-185-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-151-0x0000000003660000-0x0000000003661000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-152-0x0000000003670000-0x0000000003671000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-189-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-190-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-154-0x0000000003690000-0x0000000003691000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-147-0x0000000003610000-0x0000000003611000-memory.dmp
                        Filesize

                        4KB

                      • memory/1204-191-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-162-0x00000000036A0000-0x00000000036E0000-memory.dmp
                        Filesize

                        256KB

                      • memory/1204-187-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1204-164-0x00000000036A0000-0x00000000036E0000-memory.dmp
                        Filesize

                        256KB

                      • memory/1204-166-0x00000000036A0000-0x00000000036E0000-memory.dmp
                        Filesize

                        256KB

                      • memory/1204-167-0x00000000036A0000-0x00000000036E0000-memory.dmp
                        Filesize

                        256KB

                      • memory/1204-168-0x00000000036A0000-0x00000000036E0000-memory.dmp
                        Filesize

                        256KB

                      • memory/1204-186-0x00000000042C0000-0x00000000043C0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/1936-70-0x00000000003D0000-0x0000000000434000-memory.dmp
                        Filesize

                        400KB

                      • memory/1936-71-0x0000000073370000-0x0000000073B21000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/1936-72-0x0000000004FB0000-0x0000000004FC0000-memory.dmp
                        Filesize

                        64KB

                      • memory/1936-73-0x00000000027F0000-0x00000000027F1000-memory.dmp
                        Filesize

                        4KB

                      • memory/1936-89-0x0000000073370000-0x0000000073B21000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/1936-80-0x0000000002A00000-0x0000000004A00000-memory.dmp
                        Filesize

                        32.0MB

                      • memory/2060-458-0x0000000000400000-0x0000000000ECD000-memory.dmp
                        Filesize

                        10.8MB

                      • memory/2080-38-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/2080-24-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/2080-22-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/2080-25-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/2080-26-0x0000000000400000-0x0000000000537000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/3116-158-0x0000000000A10000-0x0000000000B10000-memory.dmp
                        Filesize

                        1024KB

                      • memory/3116-161-0x00000000023F0000-0x00000000023F4000-memory.dmp
                        Filesize

                        16KB

                      • memory/3256-20-0x0000000002910000-0x00000000029AF000-memory.dmp
                        Filesize

                        636KB

                      • memory/3256-21-0x0000000002AC0000-0x0000000002BDB000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/3344-4-0x00000000013B0000-0x00000000013C6000-memory.dmp
                        Filesize

                        88KB

                      • memory/3344-261-0x00000000013E0000-0x00000000013E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/3980-41-0x0000000002730000-0x00000000027C9000-memory.dmp
                        Filesize

                        612KB

                      • memory/4168-109-0x0000000000400000-0x0000000000644000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/4168-132-0x0000000000400000-0x0000000000644000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/4168-114-0x0000000000400000-0x0000000000644000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/4168-113-0x0000000000400000-0x0000000000644000-memory.dmp
                        Filesize

                        2.3MB

                      • memory/4272-83-0x0000000005020000-0x0000000005030000-memory.dmp
                        Filesize

                        64KB

                      • memory/4272-79-0x0000000004E40000-0x0000000004ED2000-memory.dmp
                        Filesize

                        584KB

                      • memory/4272-76-0x0000000000400000-0x0000000000450000-memory.dmp
                        Filesize

                        320KB

                      • memory/4272-88-0x0000000005120000-0x000000000516C000-memory.dmp
                        Filesize

                        304KB

                      • memory/4272-87-0x00000000050D0000-0x000000000510C000-memory.dmp
                        Filesize

                        240KB

                      • memory/4272-86-0x0000000005070000-0x0000000005082000-memory.dmp
                        Filesize

                        72KB

                      • memory/4272-85-0x0000000005200000-0x000000000530A000-memory.dmp
                        Filesize

                        1.0MB

                      • memory/4272-84-0x0000000005F20000-0x0000000006538000-memory.dmp
                        Filesize

                        6.1MB

                      • memory/4272-78-0x0000000005350000-0x00000000058F6000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/4272-141-0x0000000005990000-0x00000000059F6000-memory.dmp
                        Filesize

                        408KB

                      • memory/4272-82-0x0000000004E00000-0x0000000004E0A000-memory.dmp
                        Filesize

                        40KB

                      • memory/4272-81-0x0000000073370000-0x0000000073B21000-memory.dmp
                        Filesize

                        7.7MB

                      • memory/4476-644-0x0000021EF69D0000-0x0000021EF69F0000-memory.dmp
                        Filesize

                        128KB

                      • memory/4476-649-0x0000021EF7190000-0x0000021EF71B0000-memory.dmp
                        Filesize

                        128KB

                      • memory/4492-1-0x0000000000DF0000-0x0000000000EF0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/4492-2-0x0000000000D90000-0x0000000000D9B000-memory.dmp
                        Filesize

                        44KB

                      • memory/4492-3-0x0000000000400000-0x0000000000AEA000-memory.dmp
                        Filesize

                        6.9MB

                      • memory/4492-5-0x0000000000400000-0x0000000000AEA000-memory.dmp
                        Filesize

                        6.9MB

                      • memory/4616-461-0x00007FF673E20000-0x00007FF675D6C000-memory.dmp
                        Filesize

                        31.3MB

                      • memory/4616-318-0x00007FF673E20000-0x00007FF675D6C000-memory.dmp
                        Filesize

                        31.3MB

                      • memory/4788-163-0x0000000000400000-0x0000000000406000-memory.dmp
                        Filesize

                        24KB

                      • memory/4788-170-0x0000000000410000-0x0000000000413000-memory.dmp
                        Filesize

                        12KB

                      • memory/4788-169-0x0000000000400000-0x0000000000406000-memory.dmp
                        Filesize

                        24KB

                      • memory/4788-157-0x0000000000400000-0x0000000000406000-memory.dmp
                        Filesize

                        24KB

                      • memory/4968-108-0x00000000007B0000-0x00000000008B0000-memory.dmp
                        Filesize

                        1024KB

                      • memory/4968-110-0x0000000002190000-0x00000000021C1000-memory.dmp
                        Filesize

                        196KB

                      • memory/5088-462-0x0000000000C40000-0x0000000000C8B000-memory.dmp
                        Filesize

                        300KB

                      • memory/5088-457-0x0000000000C40000-0x0000000000C8B000-memory.dmp
                        Filesize

                        300KB