Analysis

  • max time kernel
    300s
  • max time network
    300s
  • platform
    windows10-1703_x64
  • resource
    win10-20240221-en
  • resource tags

    arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system
  • submitted
    29-03-2024 01:53

General

  • Target

    b0f1d6defb63ca51dce41219e35f97ab8d89ec19c863f5b659fb8b05c1c92248.exe

  • Size

    308KB

  • MD5

    60f468fb140a2497c65273bbaccb51f7

  • SHA1

    fd5ce406c85ec123c40eef3969cb44f32997159f

  • SHA256

    b0f1d6defb63ca51dce41219e35f97ab8d89ec19c863f5b659fb8b05c1c92248

  • SHA512

    38bdf0d78d0c90f7e1ee7e0b0d0e455b0b004a3e9c0dc8ba7f11a3902d8652829e870b6a70215df6bec410308e0ffca84a1f6aa6ec9674db365200fbd19a059e

  • SSDEEP

    3072:FGmUR5WgfI91+oYYCEXXhRwtnm4r/xHyhnpIGrI5KSWA612UIK:ZURzw1zRDwtnfrsRHrcU/

Malware Config

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

smokeloader

Version

2022

C2

http://trad-einmyus.com/index.php

http://tradein-myus.com/index.php

http://trade-inmyus.com/index.php

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://sajdfue.com/test1/get.php

Attributes
  • extension

    .vook

  • offline_id

    1eSPzWRaNslCgtjBZfL5pzvovoiaVI4IZSnvAwt1

  • payload_url

    http://sdfjhuz.com/dl/build2.exe

    http://sajdfue.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. Do not ask assistants from youtube and recovery data sites for help in recovering your data. They can use your free decryption quota and scam you. Our contact is emails in this text document only. You can get and look video overview decrypt tool: https://wetransfer.com/downloads/3ed7a617738550b0a00c5aa231c0752020240316170955/d71ce1 Price of private key and decrypt software is $999. Discount 50% available if you contact us first 72 hours, that's price for you is $499. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@freshingmail.top Reserve e-mail address to contact us: datarestorehelpyou@airmail.cc Your personal ID: 0857PsawqS

rsa_pubkey.plain

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

5.42.65.0:29587

Extracted

Family

vidar

Version

8.6

Botnet

5739ef2bbcd39fcd59c5746bfe4238c5

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    5739ef2bbcd39fcd59c5746bfe4238c5

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Extracted

Family

lumma

C2

https://resergvearyinitiani.shop/api

https://affordcharmcropwo.shop/api

Signatures

  • DcRat 6 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Detect Vidar Stealer 5 IoCs
  • Detected Djvu ransomware 16 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Glupteba

    Glupteba is a modular loader written in Golang with various components.

  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Windows security bypass 2 TTPs 7 IoCs
  • Downloads MZ/PE file
  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 25 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 7 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 2 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Manipulates WinMonFS driver. 1 IoCs

    Roottkits write to WinMonFS to hide directories/files from being detected.

  • Drops file in System32 directory 7 IoCs
  • Suspicious use of SetThreadContext 10 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 29 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 29 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 44 IoCs
  • Suspicious use of SendNotifyMessage 23 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b0f1d6defb63ca51dce41219e35f97ab8d89ec19c863f5b659fb8b05c1c92248.exe
    "C:\Users\Admin\AppData\Local\Temp\b0f1d6defb63ca51dce41219e35f97ab8d89ec19c863f5b659fb8b05c1c92248.exe"
    1⤵
    • DcRat
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4404
  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1B1.bat" "
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\system32\reg.exe
      reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
      2⤵
        PID:4784
    • C:\Users\Admin\AppData\Local\Temp\1DD5.exe
      C:\Users\Admin\AppData\Local\Temp\1DD5.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Users\Admin\AppData\Local\Temp\1DD5.exe
        C:\Users\Admin\AppData\Local\Temp\1DD5.exe
        2⤵
        • DcRat
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4632
        • C:\Windows\SysWOW64\icacls.exe
          icacls "C:\Users\Admin\AppData\Local\ec68876d-faf8-4ba0-a0c6-66ae6ec09de9" /deny *S-1-1-0:(OI)(CI)(DE,DC)
          3⤵
          • Modifies file permissions
          PID:1836
        • C:\Users\Admin\AppData\Local\Temp\1DD5.exe
          "C:\Users\Admin\AppData\Local\Temp\1DD5.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Users\Admin\AppData\Local\Temp\1DD5.exe
            "C:\Users\Admin\AppData\Local\Temp\1DD5.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:228
            • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build2.exe
              "C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:4840
              • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build2.exe
                "C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build2.exe"
                6⤵
                • Executes dropped EXE
                PID:2992
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2992 -s 1960
                  7⤵
                  • Program crash
                  PID:4788
            • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build3.exe
              "C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build3.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4712
              • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build3.exe
                "C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build3.exe"
                6⤵
                • Executes dropped EXE
                PID:3948
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  7⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:2772
    • C:\Users\Admin\AppData\Local\Temp\3342.exe
      C:\Users\Admin\AppData\Local\Temp\3342.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:4980
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          2⤵
            PID:868
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            2⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1676
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 816
            2⤵
            • Program crash
            PID:776
        • C:\Users\Admin\AppData\Local\Temp\C949.exe
          C:\Users\Admin\AppData\Local\Temp\C949.exe
          1⤵
          • Executes dropped EXE
          PID:4600
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CD80.bat" "
          1⤵
            PID:2140
            • C:\Windows\system32\reg.exe
              reg add "HKEY_CURRENT_USER\Software\clicker\key" /v primary /t REG_DWORD /d 1
              2⤵
                PID:908
            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:3168
              • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                2⤵
                • Executes dropped EXE
                PID:3680
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  3⤵
                  • DcRat
                  • Creates scheduled task(s)
                  PID:4676
            • C:\Users\Admin\AppData\Local\Temp\5213.exe
              C:\Users\Admin\AppData\Local\Temp\5213.exe
              1⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              PID:164
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                2⤵
                  PID:2128
              • C:\Users\Admin\AppData\Local\Temp\6A01.exe
                C:\Users\Admin\AppData\Local\Temp\6A01.exe
                1⤵
                • Executes dropped EXE
                PID:3092
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -nologo -noprofile
                  2⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2896
                • C:\Users\Admin\AppData\Local\Temp\6A01.exe
                  "C:\Users\Admin\AppData\Local\Temp\6A01.exe"
                  2⤵
                  • Windows security bypass
                  • Executes dropped EXE
                  • Windows security modification
                  • Adds Run key to start application
                  • Checks for VirtualBox DLLs, possible anti-VM trick
                  • Drops file in Windows directory
                  • Modifies data under HKEY_USERS
                  PID:2816
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    powershell -nologo -noprofile
                    3⤵
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:3560
                  • C:\Windows\System32\cmd.exe
                    C:\Windows\Sysnative\cmd.exe /C "netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes"
                    3⤵
                      PID:3928
                      • C:\Windows\system32\netsh.exe
                        netsh advfirewall firewall add rule name="csrss" dir=in action=allow program="C:\Windows\rss\csrss.exe" enable=yes
                        4⤵
                        • Modifies Windows Firewall
                        • Modifies data under HKEY_USERS
                        PID:5028
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:2928
                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      powershell -nologo -noprofile
                      3⤵
                      • Drops file in System32 directory
                      • Modifies data under HKEY_USERS
                      PID:3576
                    • C:\Windows\rss\csrss.exe
                      C:\Windows\rss\csrss.exe
                      3⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Manipulates WinMonFS driver.
                      • Drops file in Windows directory
                      PID:5036
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        powershell -nologo -noprofile
                        4⤵
                        • Drops file in System32 directory
                        • Modifies data under HKEY_USERS
                        PID:4280
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                        4⤵
                        • DcRat
                        • Creates scheduled task(s)
                        PID:3560
                      • C:\Windows\SYSTEM32\schtasks.exe
                        schtasks /delete /tn ScheduledUpdate /f
                        4⤵
                          PID:3812
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:4504
                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                          powershell -nologo -noprofile
                          4⤵
                          • Drops file in System32 directory
                          • Modifies data under HKEY_USERS
                          PID:3584
                        • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                          C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe taskmgr.exe C:\Users\Admin\AppData\Local\Temp\csrss\injector\NtQuerySystemInformationHook.dll
                          4⤵
                          • Executes dropped EXE
                          PID:3748
                        • C:\Windows\SYSTEM32\schtasks.exe
                          schtasks /CREATE /SC ONLOGON /RL HIGHEST /TR "C:\Windows\rss\csrss.exe" /TN csrss /F
                          4⤵
                          • DcRat
                          • Creates scheduled task(s)
                          PID:3984
                        • C:\Windows\windefender.exe
                          "C:\Windows\windefender.exe"
                          4⤵
                          • Executes dropped EXE
                          PID:2420
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /C sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                            5⤵
                              PID:2172
                              • C:\Windows\SysWOW64\sc.exe
                                sc sdset WinDefender D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPLOCRSDRCWDWO;;;BA)(D;;WPDT;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)S:(AU;FA;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;WD)
                                6⤵
                                • Launches sc.exe
                                PID:3192
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                      • Modifies Installed Components in the registry
                      • Enumerates connected drives
                      • Drops file in Windows directory
                      • Checks SCSI registry key(s)
                      • Modifies registry class
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4088
                    • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
                      1⤵
                      • Drops file in Windows directory
                      • Enumerates system info in registry
                      • Modifies Internet Explorer settings
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      PID:944
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3872
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        2⤵
                        • Executes dropped EXE
                        PID:3696
                    • C:\Windows\windefender.exe
                      C:\Windows\windefender.exe
                      1⤵
                      • Executes dropped EXE
                      • Modifies data under HKEY_USERS
                      PID:5068
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:3648
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        2⤵
                        • Executes dropped EXE
                        PID:4680
                    • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                      1⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      PID:4596
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                        2⤵
                        • Executes dropped EXE
                        PID:4532

                    Network

                    MITRE ATT&CK Matrix ATT&CK v13

                    Execution

                    Scheduled Task/Job

                    1
                    T1053

                    Persistence

                    Boot or Logon Autostart Execution

                    2
                    T1547

                    Registry Run Keys / Startup Folder

                    2
                    T1547.001

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Scheduled Task/Job

                    1
                    T1053

                    Privilege Escalation

                    Boot or Logon Autostart Execution

                    2
                    T1547

                    Registry Run Keys / Startup Folder

                    2
                    T1547.001

                    Create or Modify System Process

                    1
                    T1543

                    Windows Service

                    1
                    T1543.003

                    Scheduled Task/Job

                    1
                    T1053

                    Defense Evasion

                    Impair Defenses

                    3
                    T1562

                    Disable or Modify Tools

                    2
                    T1562.001

                    Disable or Modify System Firewall

                    1
                    T1562.004

                    Modify Registry

                    5
                    T1112

                    File and Directory Permissions Modification

                    1
                    T1222

                    Credential Access

                    Unsecured Credentials

                    3
                    T1552

                    Credentials In Files

                    3
                    T1552.001

                    Discovery

                    Query Registry

                    5
                    T1012

                    Peripheral Device Discovery

                    2
                    T1120

                    System Information Discovery

                    5
                    T1082

                    Collection

                    Data from Local System

                    3
                    T1005

                    Command and Control

                    Web Service

                    1
                    T1102

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                      Filesize

                      1KB

                      MD5

                      2a789d6b366b95c47c2e68c27f863f81

                      SHA1

                      1b123bd94179f5b8746bc960691ddb9546855e05

                      SHA256

                      ba4990d90cdd27ce932e39c10e178659436aeb5a290faa47f4825da9eca6bc94

                      SHA512

                      027180aabc65ae3ca35f83161b11d289d87af854656483ac2cf703d94f695c4d5bce0fce1901278ab4cbfc985c9b9aa1f455c889913834c4b1734a365c7f8e3b

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                      Filesize

                      724B

                      MD5

                      8202a1cd02e7d69597995cabbe881a12

                      SHA1

                      8858d9d934b7aa9330ee73de6c476acf19929ff6

                      SHA256

                      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

                      SHA512

                      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
                      Filesize

                      410B

                      MD5

                      bae37e3917d685922ea587151289b997

                      SHA1

                      bed656c275f38c4ca6d253147065b61f21c2dbc7

                      SHA256

                      7207178bcd98c12c120faccab73a4d20b6fe9637f30c96ff0df95d7eecc02065

                      SHA512

                      7eea5ac4c6d86d9183b843df49aa7f79242cb5260cd72cedce8e81444d747643931fce58dbcb2d557c4aaf2b2b9bcf76d6e8742ec5512dc336d1ee2af277b171

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464
                      Filesize

                      392B

                      MD5

                      0b3baea94d80f5753aa8ff0b3cf82843

                      SHA1

                      f2821bd000658c912cc8bc263e8e9b7434f69e38

                      SHA256

                      c02754af94ed22d353111c9bada21754ce90d9a1a2a4a6b56236f907da16e393

                      SHA512

                      24b35c367d5935cda8bee48f2dbb21ef885bc11402922801d0dcea7bca79b83b5db633cff5cb9420bc614fed083685b608ef2641aee6c85300df90fc1041f197

                    • C:\Users\Admin\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
                      Filesize

                      980B

                      MD5

                      e0752f5b8529c28ccc0941d9ed4ab65f

                      SHA1

                      fd805bc32b459f505d42902ac833eb1c7a27735a

                      SHA256

                      7601b1d5bb74b1cda856c74607b1ed28065406185cc0e3668c2c1548b52f88b1

                      SHA512

                      c505aea1aeae462ed678b52b628130a63e5d3b824869f1d577bdc5997c25def70db80e8acde33d58bfb61664faf890e08bfbfd8982272c8c513353a42b5b7e3c

                    • C:\Users\Admin\AppData\Local\Temp\1B1.bat
                      Filesize

                      77B

                      MD5

                      55cc761bf3429324e5a0095cab002113

                      SHA1

                      2cc1ef4542a4e92d4158ab3978425d517fafd16d

                      SHA256

                      d6cceb3c71b80403364bf142f2fa4624ee0be36a49bac25ed45a497cf1ce9c3a

                      SHA512

                      33f9f5cad22d291077787c7df510806e4ac31f453d288712595af6debe579fabed6cdf4662e46e6fa94de135b161e739f55cfae05c36c87af85ed6a6ad1c9155

                    • C:\Users\Admin\AppData\Local\Temp\1DD5.exe
                      Filesize

                      759KB

                      MD5

                      46a230d9be88dd7dca63ab0ec41c0b14

                      SHA1

                      8072cc39226b6b18164eb58a81ce7433fae55c58

                      SHA256

                      59b4a0b07d2a7901e49e8cc55c2eae5b457fde6e8b25295374a3e4ee37e207b5

                      SHA512

                      8c21b6c8f33608e47ead31e1e731a7cd4791d53a05f4574143156f067669a4ced8b48ffcd4f13f5d9cf9eb63dfa7873d8f491b4a02e05370fd03ca210adf9a28

                    • C:\Users\Admin\AppData\Local\Temp\3342.exe
                      Filesize

                      392KB

                      MD5

                      89ec2c6bf09ed9a38bd11acb2a41cd1b

                      SHA1

                      408549982b687ca8dd5efb0e8b704a374bd8909d

                      SHA256

                      da1e155c46ca6b23409d059b6d85341c0b86c92d2c69dbda85eef3894313662d

                      SHA512

                      c565dbb25dd35ae8dce2a4cf15640053aca8b99c5c78db23648e6618ef316362b77142c6524b47089a7ea05632adee091ec5e82ed95aeb86d2331b8c5f8cc56a

                    • C:\Users\Admin\AppData\Local\Temp\5213.exe
                      Filesize

                      30.6MB

                      MD5

                      ff35671d54d612772b0c22c141a3056e

                      SHA1

                      d005a27cd48556bf17eb9c2b43af49b67347cc0e

                      SHA256

                      2f625ea35f82332c639049c4a849f39cd2b74acb013880d156a2f647497c2512

                      SHA512

                      9a40a657f196036ef07c410db225f7a023f7299abc078cefd5d97489e7359ce9c640d72b98fedbf3f11ebaba1987b0acd5c7892b1ba5b5ae18709037df45790e

                    • C:\Users\Admin\AppData\Local\Temp\6A01.exe
                      Filesize

                      4.1MB

                      MD5

                      e445c438749eab1cc57d98407a83875a

                      SHA1

                      4b67b8f084aaf3a7a89534b32beab4e5faef674d

                      SHA256

                      f5cb5ace2b7d35f46c14eb827cf041dba371d5b9b9c8c7ef8ca4af01faebab37

                      SHA512

                      1e338586df2dcf4a77f9605860e18c5feb6f0cdabf7165877a53996af944aac361a4ca1faa2cce791a0d1336458965888d05af495bb6e2faac6031ed3cd160d4

                    • C:\Users\Admin\AppData\Local\Temp\C949.exe
                      Filesize

                      6.5MB

                      MD5

                      9e52aa572f0afc888c098db4c0f687ff

                      SHA1

                      ef7c2bb222e69ad0e10c8686eb03dcbee7933c2b

                      SHA256

                      4a40f9d491f09521f4b0c6076a0eb488f6d8e1cf4b67aa6569c2ccce13556443

                      SHA512

                      d0991e682ae8c954721e905753b56c01f91b85313beb9996331793c3efa8acc13d574ef5ba44853ecc3e05822931ed655bad1924fa11b774a43e015f42185f62

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3uskohar.w15.ps1
                      Filesize

                      1B

                      MD5

                      c4ca4238a0b923820dcc509a6f75849b

                      SHA1

                      356a192b7913b04c54574d18c28d46e6395428ab

                      SHA256

                      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

                      SHA512

                      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

                    • C:\Users\Admin\AppData\Local\Temp\csrss\injector\injector.exe
                      Filesize

                      281KB

                      MD5

                      d98e33b66343e7c96158444127a117f6

                      SHA1

                      bb716c5509a2bf345c6c1152f6e3e1452d39d50d

                      SHA256

                      5de4e2b07a26102fe527606ce5da1d5a4b938967c9d380a3c5fe86e2e34aaaf1

                      SHA512

                      705275e4a1ba8205eb799a8cf1737bc8ba686925e52c9198a6060a7abeee65552a85b814ac494a4b975d496a63be285f19a6265550585f2fc85824c42d7efab5

                    • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build2.exe
                      Filesize

                      277KB

                      MD5

                      8dae8b6a6be6e3527183594d1c26a2d3

                      SHA1

                      b87e40cee60869a36e79c88c8a3a34baf0bc4889

                      SHA256

                      afce72cd3bc717c784962083066e3ede2b0aaadbe0908ec7360096c923774fa5

                      SHA512

                      0bf065700db647efba39a13a58242a595907e6c11885575cf0bdad9e23ab40583c8a6535464e46d75d075e20d88b7a6305a761df9da787fdc8728483dd48f96e

                    • C:\Users\Admin\AppData\Local\b0188cfc-4aed-41fd-90e8-0b897bfd55b7\build3.exe
                      Filesize

                      299KB

                      MD5

                      41b883a061c95e9b9cb17d4ca50de770

                      SHA1

                      1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                      SHA256

                      fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                      SHA512

                      cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                    • C:\Users\Admin\AppData\Roaming\tdasudr
                      Filesize

                      308KB

                      MD5

                      60f468fb140a2497c65273bbaccb51f7

                      SHA1

                      fd5ce406c85ec123c40eef3969cb44f32997159f

                      SHA256

                      b0f1d6defb63ca51dce41219e35f97ab8d89ec19c863f5b659fb8b05c1c92248

                      SHA512

                      38bdf0d78d0c90f7e1ee7e0b0d0e455b0b004a3e9c0dc8ba7f11a3902d8652829e870b6a70215df6bec410308e0ffca84a1f6aa6ec9674db365200fbd19a059e

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
                      Filesize

                      2KB

                      MD5

                      db01a2c1c7e70b2b038edf8ad5ad9826

                      SHA1

                      540217c647a73bad8d8a79e3a0f3998b5abd199b

                      SHA256

                      413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

                      SHA512

                      c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                      Filesize

                      18KB

                      MD5

                      3eccac81e4c94fa251734345c06e0fea

                      SHA1

                      28199ed53dd02309bd40f86a74dfa45e841d4d08

                      SHA256

                      6a05910d51952d0a13ff81ebd63bb0398fc0b9a4344ffe095fb06b9bc83ed0af

                      SHA512

                      b099161b0a664beb853426e88c7703e4d20b8b5bd2bea4884d84ab131c6905507d855205ead3b1ba7beaa34eea63ab619fa8fbf530590ea0f8f6f9258ec1a4b7

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                      Filesize

                      18KB

                      MD5

                      6ef2fc3a08bbf9364b7fe85a8f7a76b3

                      SHA1

                      52e60c741465c60cdcd6e8d6e5ed0ce0658b170f

                      SHA256

                      beffba228ed69ccb24f801c83a7ec57c3c4bd8a893e03ea4e46b8da5660f0f93

                      SHA512

                      40368114d70a0746feb3b2098228281cedaacf78ca024ab832c3558b4a94ae1870a3a09fcac37310f9e9a506a3f4f66b4d61d4b4acfe38d2bcbf62fd059983b9

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                      Filesize

                      18KB

                      MD5

                      f88309dcf5df80dbd4543c988bb11246

                      SHA1

                      48cd88868fcbc78c5af6026f4662b1257c440fe6

                      SHA256

                      c25caf448c256e1f50e943d1bfb411e256aa8b38328c34104ac66f7b979060b3

                      SHA512

                      947c9ac4438f3e25ce4a66038b4520a63b632b22a5c6cd0d59ad255ab9360a90d296192433da02ba45368ed22d949b4efacd4d72637f68dfa29937472ed31044

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                      Filesize

                      18KB

                      MD5

                      d383e1b4344b4b45ed6b742619fe427a

                      SHA1

                      574d1112ced5fc75079814f8130b17a9979ff74e

                      SHA256

                      3925a2fe4f3028f5f0b63ffec80969873a9c1fc76414d6f8803c6f37f8e95edb

                      SHA512

                      637e68854ab11a01a64c0c4db8fa9d33efb5a4e264051a9ce288ee434d4ba3130b7e8bfc0847a1f4b0c3627f5669abac3233d3dad7945a0daf421b8616e86e01

                    • C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
                      Filesize

                      18KB

                      MD5

                      9fd37f05edacde7af0d80575ec3e6291

                      SHA1

                      1a892f3578fa459ad8a2aba07811eba9b3538861

                      SHA256

                      d0dbaa1c2eb35e17e3e10133313e67f0f7cefe04f7fb580adbe5b6a634f1240f

                      SHA512

                      a275595a7ca01fe64fbf0a2d8baeb430e509321fe0d284e61019939ad1980841fbbe2f643d849bb4bd86a5421dad9053ab375597878230a10f195032f512bb61

                    • C:\Windows\windefender.exe
                      Filesize

                      2.0MB

                      MD5

                      8e67f58837092385dcf01e8a2b4f5783

                      SHA1

                      012c49cfd8c5d06795a6f67ea2baf2a082cf8625

                      SHA256

                      166ddb03ff3c89bd4525ac390067e180fdd08f10fbcf4aadb0189541673c03fa

                      SHA512

                      40d8ae12663fc1851e171d9d86cea8bb12487b734c218d7b6f9742eb07d4ca265065cbd6d0bb908f8bda7e3d955c458dfe3fd13265bbf573b9351e0a2bf691ec

                    • memory/164-420-0x00007FF627550000-0x00007FF62949C000-memory.dmp
                      Filesize

                      31.3MB

                    • memory/228-101-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-77-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-63-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-60-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-108-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-56-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-68-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-69-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-79-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/228-81-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/940-21-0x0000000002830000-0x000000000294B000-memory.dmp
                      Filesize

                      1.1MB

                    • memory/940-20-0x0000000002690000-0x000000000272E000-memory.dmp
                      Filesize

                      632KB

                    • memory/1156-58-0x00000000026E1000-0x0000000002773000-memory.dmp
                      Filesize

                      584KB

                    • memory/1676-59-0x0000000005B10000-0x000000000600E000-memory.dmp
                      Filesize

                      5.0MB

                    • memory/1676-135-0x0000000073280000-0x000000007396E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/1676-80-0x00000000058E0000-0x000000000591E000-memory.dmp
                      Filesize

                      248KB

                    • memory/1676-72-0x00000000059B0000-0x0000000005ABA000-memory.dmp
                      Filesize

                      1.0MB

                    • memory/1676-71-0x0000000006620000-0x0000000006C26000-memory.dmp
                      Filesize

                      6.0MB

                    • memory/1676-82-0x0000000005920000-0x000000000596B000-memory.dmp
                      Filesize

                      300KB

                    • memory/1676-62-0x0000000073280000-0x000000007396E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/1676-128-0x0000000073280000-0x000000007396E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/1676-132-0x0000000007370000-0x0000000007532000-memory.dmp
                      Filesize

                      1.8MB

                    • memory/1676-70-0x0000000005790000-0x000000000579A000-memory.dmp
                      Filesize

                      40KB

                    • memory/1676-133-0x00000000083A0000-0x00000000088CC000-memory.dmp
                      Filesize

                      5.2MB

                    • memory/1676-73-0x0000000005870000-0x0000000005882000-memory.dmp
                      Filesize

                      72KB

                    • memory/1676-52-0x0000000000400000-0x0000000000450000-memory.dmp
                      Filesize

                      320KB

                    • memory/1676-61-0x0000000005610000-0x00000000056A2000-memory.dmp
                      Filesize

                      584KB

                    • memory/1676-112-0x0000000006EC0000-0x0000000006F10000-memory.dmp
                      Filesize

                      320KB

                    • memory/1676-111-0x00000000060E0000-0x0000000006146000-memory.dmp
                      Filesize

                      408KB

                    • memory/2992-97-0x0000000000400000-0x0000000000644000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/2992-96-0x0000000000400000-0x0000000000644000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/2992-91-0x0000000000400000-0x0000000000644000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/2992-126-0x0000000000400000-0x0000000000644000-memory.dmp
                      Filesize

                      2.3MB

                    • memory/3380-4-0x0000000000C60000-0x0000000000C76000-memory.dmp
                      Filesize

                      88KB

                    • memory/3380-438-0x0000000000C40000-0x0000000000C41000-memory.dmp
                      Filesize

                      4KB

                    • memory/3948-120-0x0000000000400000-0x0000000000406000-memory.dmp
                      Filesize

                      24KB

                    • memory/3948-114-0x0000000000400000-0x0000000000406000-memory.dmp
                      Filesize

                      24KB

                    • memory/3948-123-0x0000000000400000-0x0000000000406000-memory.dmp
                      Filesize

                      24KB

                    • memory/3948-124-0x0000000000410000-0x00000000004D5000-memory.dmp
                      Filesize

                      788KB

                    • memory/4336-115-0x0000000073280000-0x000000007396E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/4336-127-0x0000000002FF0000-0x0000000004FF0000-memory.dmp
                      Filesize

                      32.0MB

                    • memory/4336-122-0x0000000005610000-0x0000000005620000-memory.dmp
                      Filesize

                      64KB

                    • memory/4336-45-0x0000000005460000-0x0000000005461000-memory.dmp
                      Filesize

                      4KB

                    • memory/4336-57-0x0000000002FF0000-0x0000000004FF0000-memory.dmp
                      Filesize

                      32.0MB

                    • memory/4336-41-0x0000000000CA0000-0x0000000000D04000-memory.dmp
                      Filesize

                      400KB

                    • memory/4336-42-0x0000000073280000-0x000000007396E000-memory.dmp
                      Filesize

                      6.9MB

                    • memory/4336-44-0x0000000005610000-0x0000000005620000-memory.dmp
                      Filesize

                      64KB

                    • memory/4404-1-0x0000000002DA0000-0x0000000002EA0000-memory.dmp
                      Filesize

                      1024KB

                    • memory/4404-2-0x0000000002EB0000-0x0000000002EBB000-memory.dmp
                      Filesize

                      44KB

                    • memory/4404-3-0x0000000000400000-0x0000000002D4B000-memory.dmp
                      Filesize

                      41.3MB

                    • memory/4404-5-0x0000000000400000-0x0000000002D4B000-memory.dmp
                      Filesize

                      41.3MB

                    • memory/4600-171-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-176-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-157-0x0000000000860000-0x0000000001545000-memory.dmp
                      Filesize

                      12.9MB

                    • memory/4600-158-0x0000000000860000-0x0000000001545000-memory.dmp
                      Filesize

                      12.9MB

                    • memory/4600-162-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-161-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-163-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-160-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-159-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-164-0x0000000000650000-0x0000000000690000-memory.dmp
                      Filesize

                      256KB

                    • memory/4600-165-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-166-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-167-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-168-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-170-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-155-0x0000000000630000-0x0000000000631000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-169-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-172-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-173-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-174-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-175-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-156-0x0000000000640000-0x0000000000641000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-177-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-178-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-180-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-182-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-181-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-183-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-179-0x0000000003140000-0x0000000003141000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-144-0x0000000000860000-0x0000000001545000-memory.dmp
                      Filesize

                      12.9MB

                    • memory/4600-151-0x00000000005D0000-0x00000000005D1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-154-0x0000000000620000-0x0000000000621000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-150-0x00000000005C0000-0x00000000005C1000-memory.dmp
                      Filesize

                      4KB

                    • memory/4600-152-0x0000000000860000-0x0000000001545000-memory.dmp
                      Filesize

                      12.9MB

                    • memory/4600-153-0x0000000000610000-0x0000000000611000-memory.dmp
                      Filesize

                      4KB

                    • memory/4632-25-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/4632-22-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/4632-24-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/4632-26-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/4632-48-0x0000000000400000-0x0000000000537000-memory.dmp
                      Filesize

                      1.2MB

                    • memory/4712-118-0x0000000000B50000-0x0000000000C50000-memory.dmp
                      Filesize

                      1024KB

                    • memory/4712-119-0x0000000000920000-0x0000000000924000-memory.dmp
                      Filesize

                      16KB

                    • memory/4840-93-0x00000000006A0000-0x00000000006D1000-memory.dmp
                      Filesize

                      196KB

                    • memory/4840-92-0x0000000000880000-0x0000000000980000-memory.dmp
                      Filesize

                      1024KB