Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2024 16:34

General

  • Target

    304b8aa9a7b97cda67a7a6682a49b9bcc8380f04ae218ef49969e656dd0fb988.exe

  • Size

    1.9MB

  • MD5

    1c3991e284045f0f95490b5b8cf686a7

  • SHA1

    82acde994fd785c2583ce4a9f44222fb9c296010

  • SHA256

    304b8aa9a7b97cda67a7a6682a49b9bcc8380f04ae218ef49969e656dd0fb988

  • SHA512

    af52f57e51979bf070f5f96ddb1b3f93e0df8d43e379cb47afb22e0d71e734b6ea4561342c78d05be643c74db3c7b2720d32821f187e2f37fb0dc29f021d6af2

  • SSDEEP

    49152:Lm086a2NrCAVeeuEwec95fvTtPd8xHJhxycFkZXh:Sd2TOEo95pPSJQZ

Malware Config

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Extracted

Family

redline

Botnet

@OLEH_PSP

C2

185.172.128.33:8970

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

redline

Botnet

Jok123

C2

185.215.113.67:26260

Extracted

Family

redline

Botnet

LiveTraffic

C2

4.185.137.132:1632

Extracted

Family

vidar

Version

8.6

Botnet

22d12fb91f01647fe2107fec81f0cc22

C2

https://steamcommunity.com/profiles/76561199658817715

https://t.me/sa9ok

Attributes
  • profile_id_v2

    22d12fb91f01647fe2107fec81f0cc22

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detect Vidar Stealer 2 IoCs
  • Detect ZGRat V1 4 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 8 IoCs
  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\304b8aa9a7b97cda67a7a6682a49b9bcc8380f04ae218ef49969e656dd0fb988.exe
    "C:\Users\Admin\AppData\Local\Temp\304b8aa9a7b97cda67a7a6682a49b9bcc8380f04ae218ef49969e656dd0fb988.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1444
  • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
      "C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      PID:3272
    • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
      "C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:436
        • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
          "C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe"
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "RegAsm.exe"
          4⤵
            PID:2900
            • C:\Windows\System32\Conhost.exe
              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              5⤵
                PID:612
              • C:\Windows\SysWOW64\choice.exe
                choice /C Y /N /D Y /T 3
                5⤵
                  PID:1592
          • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
            "C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:5044
            • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
              "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Checks computer location settings
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Adds Run key to start application
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:2180
              • C:\Users\Admin\AppData\Local\Temp\1000042001\20c055c837.exe
                "C:\Users\Admin\AppData\Local\Temp\1000042001\20c055c837.exe"
                4⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                PID:3364
              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
                4⤵
                  PID:1976
                • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  PID:3972
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
                    5⤵
                    • Enumerates system info in registry
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    PID:1888
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb9c7346f8,0x7ffb9c734708,0x7ffb9c734718
                      6⤵
                        PID:612
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
                        6⤵
                          PID:5772
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                          6⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:5780
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2468 /prefetch:8
                          6⤵
                            PID:5792
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                            6⤵
                              PID:5816
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                              6⤵
                                PID:5828
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,9692793303740956050,18027475451585010527,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3876 /prefetch:1
                                6⤵
                                  PID:5468
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                                5⤵
                                  PID:4956
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9c7346f8,0x7ffb9c734708,0x7ffb9c734718
                                    6⤵
                                      PID:1120
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                    5⤵
                                      PID:4308
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb9c7346f8,0x7ffb9c734708,0x7ffb9c734718
                                        6⤵
                                          PID:5228
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7137219767395147151,659903401454924416,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:3
                                          6⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5316
                                    • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2000
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                      4⤵
                                      • Loads dropped DLL
                                      PID:3436
                                      • C:\Windows\system32\rundll32.exe
                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                        5⤵
                                        • Blocklisted process makes network request
                                        • Loads dropped DLL
                                        PID:5228
                                        • C:\Windows\system32\netsh.exe
                                          netsh wlan show profiles
                                          6⤵
                                            PID:1272
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\831553292808_Desktop.zip' -CompressionLevel Optimal
                                            6⤵
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4840
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                        4⤵
                                        • Blocklisted process makes network request
                                        • Loads dropped DLL
                                        PID:5236
                                  • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2140
                                  • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                                    "C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2184
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                    2⤵
                                    • Loads dropped DLL
                                    • Suspicious use of WriteProcessMemory
                                    PID:2968
                                    • C:\Windows\system32\rundll32.exe
                                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                      3⤵
                                      • Blocklisted process makes network request
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of WriteProcessMemory
                                      PID:4292
                                      • C:\Windows\system32\netsh.exe
                                        netsh wlan show profiles
                                        4⤵
                                          PID:4548
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\831553292808_Desktop.zip' -CompressionLevel Optimal
                                          4⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:4532
                                    • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of WriteProcessMemory
                                      PID:1648
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                        3⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3640
                                    • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious use of WriteProcessMemory
                                      PID:804
                                      • C:\Windows\SysWOW64\schtasks.exe
                                        "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe" /F
                                        3⤵
                                        • Creates scheduled task(s)
                                        PID:4820
                                    • C:\Users\Admin\AppData\Local\Temp\1001061001\Second2.exe
                                      "C:\Users\Admin\AppData\Local\Temp\1001061001\Second2.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetThreadContext
                                      PID:5364
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                        3⤵
                                          PID:3536
                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe
                                          3⤵
                                            PID:4948
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 2168
                                              4⤵
                                              • Program crash
                                              PID:5668
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                          2⤵
                                          • Blocklisted process makes network request
                                          • Loads dropped DLL
                                          PID:1140
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:5344
                                        • C:\Windows\system32\BackgroundTaskHost.exe
                                          "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                          1⤵
                                            PID:4532
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:4660
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 4948 -ip 4948
                                              1⤵
                                                PID:5620
                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                PID:3460
                                              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                1⤵
                                                • Executes dropped EXE
                                                PID:3224

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                                                Filesize

                                                3KB

                                                MD5

                                                fe3aab3ae544a134b68e881b82b70169

                                                SHA1

                                                926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                SHA256

                                                bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                SHA512

                                                3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                Filesize

                                                152B

                                                MD5

                                                9f44d6f922f830d04d7463189045a5a3

                                                SHA1

                                                2e9ae7188ab8f88078e83ba7f42a11a2c421cb1c

                                                SHA256

                                                0ae5cf8b49bc34fafe9f86734c8121b631bad52a1424c1dd2caa05781032334a

                                                SHA512

                                                7c1825eaefcc7b97bae31eeff031899300b175222de14000283e296e9b44680c8b3885a4ed5d78fd8dfee93333cd7289347b95a62bf11f751c4ca47772cf987d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                Filesize

                                                152B

                                                MD5

                                                7740a919423ddc469647f8fdd981324d

                                                SHA1

                                                c1bc3f834507e4940a0b7594e34c4b83bbea7cda

                                                SHA256

                                                bdd4adaa418d40558ab033ac0005fd6c2312d5f1f7fdf8b0e186fe1d65d78221

                                                SHA512

                                                7ad98d5d089808d9a707d577e76e809a223d3007778a672734d0a607c2c3ac5f93bc72adb6e6c7f878a577d3a1e69a16d0cd871eb6f58b8d88e2ea25f77d87b7

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                Filesize

                                                6KB

                                                MD5

                                                a2463e6f2b19db1abf9621fe9b669f5c

                                                SHA1

                                                0dda9e4d7d68475d66865264375e02e3e79441b8

                                                SHA256

                                                3922f1c2186cc55452ab2a2e9c7a1b723b5507195d87f41c2511d29c63664165

                                                SHA512

                                                c32fc5d931d3879fac496eb48e50339bf526b2b3fdc3c676c80c9013806f83fee39677e60a6311b35bb060fd33c79a3682f3b6ea62b0b5d54f15a29024f84179

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                Filesize

                                                8KB

                                                MD5

                                                bd7359d1786aa95c0be3e3b042fe11fd

                                                SHA1

                                                8a9f8849cc8a22efd4da53760b93b52aa6142f4c

                                                SHA256

                                                e3e0318675e2c7da2e8af5104f30752effc288a8a96b55e53d301dff29081b16

                                                SHA512

                                                f35a258e96d3bcde4581193d784f4e0abcb5b0a1938ccb60e5a74a35355eb0f9b04d802c8530303bc357bc151fcbf32bdcd11e9d66685ce3459ca698887df10f

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                                                Filesize

                                                1KB

                                                MD5

                                                7f5130f8643f9c281b6384704d27b900

                                                SHA1

                                                c384737918a1e492e8742800a251d31de1842de2

                                                SHA256

                                                e5a21b6e080bd51ab39ae0aa91aa0573951a52aafd2f021263141d0755e1cf8f

                                                SHA512

                                                ff471d00db8f4ec88cd0d52894e4f1a91ad32473cb173b7a5d431def9717cbe106c2ae431869651a3a9fc1801f9997a9d35d22a85cdb605ed98731e6dc129161

                                              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                Filesize

                                                1.9MB

                                                MD5

                                                1c3991e284045f0f95490b5b8cf686a7

                                                SHA1

                                                82acde994fd785c2583ce4a9f44222fb9c296010

                                                SHA256

                                                304b8aa9a7b97cda67a7a6682a49b9bcc8380f04ae218ef49969e656dd0fb988

                                                SHA512

                                                af52f57e51979bf070f5f96ddb1b3f93e0df8d43e379cb47afb22e0d71e734b6ea4561342c78d05be643c74db3c7b2720d32821f187e2f37fb0dc29f021d6af2

                                              • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
                                                Filesize

                                                894KB

                                                MD5

                                                2f8912af892c160c1c24c9f38a60c1ab

                                                SHA1

                                                d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                SHA256

                                                59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                SHA512

                                                0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                              • C:\Users\Admin\AppData\Local\Temp\1000873001\random.exe
                                                Filesize

                                                3.1MB

                                                MD5

                                                aa9d67fcde5204824e05b37eea8a4ad2

                                                SHA1

                                                d46c3b7cd920df2a09a9bc62ee57f1c156f653fd

                                                SHA256

                                                86b62836d0429a68598227ac462ffc28e0194ab49e0ea3bc0913f623fb326181

                                                SHA512

                                                24c966d21fb852633ff8c18512f5bb1cc09f11fc9c98e8f32fac4a2134c99fd433b05927a74e65d3656879c13883a3d6f32eff52bca05111fab4fa9038aacf5e

                                              • C:\Users\Admin\AppData\Local\Temp\1000985001\alex1234.exe
                                                Filesize

                                                1.7MB

                                                MD5

                                                85a15f080b09acace350ab30460c8996

                                                SHA1

                                                3fc515e60e4cfa5b3321f04a96c7fb463e4b9d02

                                                SHA256

                                                3a2006bc835a8ffe91b9ee9206f630b3172f42e090f4e8d90be620e540f5ef6b

                                                SHA512

                                                ade5e3531dfa1a01e6c2a69deb2962cbf619e766da3d6e8e3453f70ff55ccbcbe21381c7b97a53d67e1ca88975f4409b1a42a759e18f806171d29e4c3f250e9f

                                              • C:\Users\Admin\AppData\Local\Temp\1001031001\amadka.exe
                                                Filesize

                                                1.8MB

                                                MD5

                                                4e345d271484c49483a98e3feb8b0c28

                                                SHA1

                                                feef7df7a334cb691cc97bf83f6f1c90aef2c904

                                                SHA256

                                                e09a4bf1df729f84de4a9bb01a104f0e0f2518666fd89a75d8620b080ad8fd16

                                                SHA512

                                                6772e6ecb169c43de0b5f1ba5807a3188fe68d8eb717db81882dbad8dce656a25dd24a8798095ec8b5ad580a990a78e5b4b768fcf9dd803d800ec609572704e5

                                              • C:\Users\Admin\AppData\Local\Temp\1001039001\redlinepanel.exe
                                                Filesize

                                                301KB

                                                MD5

                                                832eb4dc3ed8ceb9a1735bd0c7acaf1b

                                                SHA1

                                                b622a406927fbb8f6cd5081bd4455fb831948fca

                                                SHA256

                                                2a82243697e2eec45bedc754adcdc1f6f41724a40c6d7d96fd41ad144899b6f7

                                                SHA512

                                                3ab8b25732a7152608be101a3daf0d55833c554ab968be8b3b79a49e1831f3ee0eeeb9586a3334fa387b1f160fd15e98a80dcfece559c9c257b44ef962874894

                                              • C:\Users\Admin\AppData\Local\Temp\1001040001\32456.exe
                                                Filesize

                                                499KB

                                                MD5

                                                83d0b41c7a3a0d29a268b49a313c5de5

                                                SHA1

                                                46f3251c771b67b40b1f3268caef8046174909a5

                                                SHA256

                                                09cc3364d5e1c15228822926bc65ce290c487dc3b7c0345bf265538110fa9cc9

                                                SHA512

                                                705ecc7c421338e37ed0d58c2d9fad03fb3565db422a0c9d895e75a399bf5f2a70cfe3ffdc860ffe010d4d1a213e0a844aeadb89ea8e0c830a2fc8c03b7669b5

                                              • C:\Users\Admin\AppData\Local\Temp\1001053001\goldprimeldlldf.exe
                                                Filesize

                                                464KB

                                                MD5

                                                c084d6f6ba40534fbfc5a64b21ef99ab

                                                SHA1

                                                0b4a17da83c0a8abbc8fab321931d5447b32b720

                                                SHA256

                                                afd83290a2adb219c3f1b8fbf23c27b0994fe76dfbb7dc0b416530dc0e21f624

                                                SHA512

                                                a5384a2f7029cf946fde44e1ff30775754ce525ca5a6fdac14184872b6e684cb6e585053cb86d32f82cbd3db48eb195ba3a642d8ee3774be579fccd993938ca1

                                              • C:\Users\Admin\AppData\Local\Temp\1001059001\NewB.exe
                                                Filesize

                                                418KB

                                                MD5

                                                0099a99f5ffb3c3ae78af0084136fab3

                                                SHA1

                                                0205a065728a9ec1133e8a372b1e3864df776e8c

                                                SHA256

                                                919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

                                                SHA512

                                                5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

                                              • C:\Users\Admin\AppData\Local\Temp\1001061001\Second2.exe
                                                Filesize

                                                4.6MB

                                                MD5

                                                0c2d303852f827c4852bf46550ea2ed8

                                                SHA1

                                                7bb54cb67135bbb94d8a26356f3d1e170a71a1a7

                                                SHA256

                                                194234e48c362f1bf3be6d02c5b380bfc900a2cf7911a1fc658a5a2ec0d0164f

                                                SHA512

                                                c2ab4c4a4bcfd4f9f350e946a08a9be3ded6741ac3981a977c52331a403488b4f224c7f0b01d24af3e351e532b3c3cdeedfe356785e5858411c80793fb3ca307

                                              • C:\Users\Admin\AppData\Local\Temp\Protect544cd51a.dll
                                                Filesize

                                                742KB

                                                MD5

                                                544cd51a596619b78e9b54b70088307d

                                                SHA1

                                                4769ddd2dbc1dc44b758964ed0bd231b85880b65

                                                SHA256

                                                dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

                                                SHA512

                                                f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

                                              • C:\Users\Admin\AppData\Local\Temp\Tmp5B5A.tmp
                                                Filesize

                                                2KB

                                                MD5

                                                1420d30f964eac2c85b2ccfe968eebce

                                                SHA1

                                                bdf9a6876578a3e38079c4f8cf5d6c79687ad750

                                                SHA256

                                                f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

                                                SHA512

                                                6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yugpzp2u.gyf.ps1
                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Local\Temp\tmp828B.tmp
                                                Filesize

                                                46KB

                                                MD5

                                                02d2c46697e3714e49f46b680b9a6b83

                                                SHA1

                                                84f98b56d49f01e9b6b76a4e21accf64fd319140

                                                SHA256

                                                522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

                                                SHA512

                                                60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

                                              • C:\Users\Admin\AppData\Local\Temp\tmp83B7.tmp
                                                Filesize

                                                48KB

                                                MD5

                                                349e6eb110e34a08924d92f6b334801d

                                                SHA1

                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                SHA256

                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                SHA512

                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                              • C:\Users\Admin\AppData\Local\Temp\tmpA5E7.tmp
                                                Filesize

                                                20KB

                                                MD5

                                                49693267e0adbcd119f9f5e02adf3a80

                                                SHA1

                                                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                SHA256

                                                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                SHA512

                                                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                              • C:\Users\Admin\AppData\Local\Temp\tmpA65A.tmp
                                                Filesize

                                                116KB

                                                MD5

                                                f70aa3fa04f0536280f872ad17973c3d

                                                SHA1

                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                SHA256

                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                SHA512

                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll
                                                Filesize

                                                109KB

                                                MD5

                                                2afdbe3b99a4736083066a13e4b5d11a

                                                SHA1

                                                4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                SHA256

                                                8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                SHA512

                                                d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll
                                                Filesize

                                                1.2MB

                                                MD5

                                                92fbdfccf6a63acef2743631d16652a7

                                                SHA1

                                                971968b1378dd89d59d7f84bf92f16fc68664506

                                                SHA256

                                                b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                SHA512

                                                b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll
                                                Filesize

                                                109KB

                                                MD5

                                                726cd06231883a159ec1ce28dd538699

                                                SHA1

                                                404897e6a133d255ad5a9c26ac6414d7134285a2

                                                SHA256

                                                12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                SHA512

                                                9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                              • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll
                                                Filesize

                                                1.2MB

                                                MD5

                                                15a42d3e4579da615a384c717ab2109b

                                                SHA1

                                                22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                SHA256

                                                3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                SHA512

                                                1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                              • C:\Users\Admin\AppData\Roaming\configurationValue\Traffic.exe
                                                Filesize

                                                541KB

                                                MD5

                                                1fc4b9014855e9238a361046cfbf6d66

                                                SHA1

                                                c17f18c8246026c9979ab595392a14fe65cc5e9f

                                                SHA256

                                                f38c27ecbeed9721f0885d3b2f2f767d60a5d1c0a5c98433357f570987da3e50

                                                SHA512

                                                2af234cac24ec4a508693d9affa7f759d4b29bb3c9ddffd9e6350959fd4da26501553399d2b02a8eeae8dace6bfe9b2ce50462ce3c6547497f5b0ea6ed226b12

                                              • C:\Users\Admin\AppData\Roaming\configurationValue\propro.exe
                                                Filesize

                                                304KB

                                                MD5

                                                cc90e3326d7b20a33f8037b9aab238e4

                                                SHA1

                                                236d173a6ac462d85de4e866439634db3b9eeba3

                                                SHA256

                                                bd73ee49a23901f9fb235f8a5b29adc72cc637ad4b62a9760c306900cb1678b7

                                                SHA512

                                                b5d197a05a267bf66509b6d976924cd6f5963532a9f9f22d1763701d4fba3dfa971e0058388249409884bc29216fb33a51846562a5650f81d99ce14554861521

                                              • C:\Users\Admin\Desktop\Microsoft Edge.lnk
                                                Filesize

                                                2KB

                                                MD5

                                                0cd30a535928ad38f298a7205b358371

                                                SHA1

                                                2a5d74f3e115a9dc1b4c1f06d64c116019cc9f74

                                                SHA256

                                                dd644bf7450681accfdeb21afadc55030655f39791a04d35d07e958d728c3fbe

                                                SHA512

                                                a03b668fc96040f58578a9f29ab42edd9cc8eae37e8a1dcd448cff8c047384f592f71b7c6b3b89e866efb9c4448ddbfc480210398ba15aca2ea61f64baeefa2b

                                              • C:\Users\Public\Desktop\Google Chrome.lnk
                                                Filesize

                                                2KB

                                                MD5

                                                6e6edbcc005adbeacc660f6c19d8202f

                                                SHA1

                                                0d792648a9c772a808013637514b8b371b653d96

                                                SHA256

                                                846ba2a26b6a759403feabc5110d02ae58a9e359a6c04db106d16a37e457f0b7

                                                SHA512

                                                ecfcb343a68c8ba7b19c1d57da4dab387023f845f998971c69d73ca6eb403752e112b2d256a14e7138e4b4ab30ee31ec25591066800ebb1a8dbbad1ef966b1ab

                                              • \??\pipe\LOCAL\crashpad_1888_LLIKYOPWSUCIKGZD
                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • memory/436-147-0x0000000001510000-0x0000000001520000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/436-144-0x00007FFBA1C10000-0x00007FFBA26D1000-memory.dmp
                                                Filesize

                                                10.8MB

                                              • memory/436-127-0x0000000000B70000-0x0000000000BFC000-memory.dmp
                                                Filesize

                                                560KB

                                              • memory/1444-9-0x0000000005570000-0x0000000005571000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-11-0x0000000005590000-0x0000000005591000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-6-0x0000000005580000-0x0000000005581000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-1-0x0000000077E44000-0x0000000077E46000-memory.dmp
                                                Filesize

                                                8KB

                                              • memory/1444-2-0x0000000000B90000-0x0000000001066000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/1444-0-0x0000000000B90000-0x0000000001066000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/1444-3-0x0000000005540000-0x0000000005541000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-16-0x0000000000B90000-0x0000000001066000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/1444-7-0x0000000005510000-0x0000000005511000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-5-0x0000000005530000-0x0000000005531000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-4-0x0000000005550000-0x0000000005551000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-10-0x00000000055A0000-0x00000000055A1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1444-8-0x0000000005520000-0x0000000005521000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/1960-107-0x0000000004FA0000-0x0000000005032000-memory.dmp
                                                Filesize

                                                584KB

                                              • memory/1960-172-0x00000000066E0000-0x000000000671C000-memory.dmp
                                                Filesize

                                                240KB

                                              • memory/1960-117-0x0000000005120000-0x0000000005130000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/1960-145-0x0000000005B60000-0x0000000005BD6000-memory.dmp
                                                Filesize

                                                472KB

                                              • memory/1960-106-0x00000000054B0000-0x0000000005A54000-memory.dmp
                                                Filesize

                                                5.6MB

                                              • memory/1960-104-0x00000000737C0000-0x0000000073F70000-memory.dmp
                                                Filesize

                                                7.7MB

                                              • memory/1960-105-0x0000000000610000-0x0000000000662000-memory.dmp
                                                Filesize

                                                328KB

                                              • memory/1960-162-0x0000000006680000-0x0000000006692000-memory.dmp
                                                Filesize

                                                72KB

                                              • memory/1960-174-0x0000000006850000-0x000000000689C000-memory.dmp
                                                Filesize

                                                304KB

                                              • memory/1960-157-0x0000000006BF0000-0x0000000007208000-memory.dmp
                                                Filesize

                                                6.1MB

                                              • memory/1960-149-0x0000000006370000-0x000000000638E000-memory.dmp
                                                Filesize

                                                120KB

                                              • memory/1960-120-0x0000000004F40000-0x0000000004F4A000-memory.dmp
                                                Filesize

                                                40KB

                                              • memory/1960-160-0x0000000006740000-0x000000000684A000-memory.dmp
                                                Filesize

                                                1.0MB

                                              • memory/2000-460-0x0000000000C70000-0x0000000001146000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2140-189-0x00000000737C0000-0x0000000073F70000-memory.dmp
                                                Filesize

                                                7.7MB

                                              • memory/2140-188-0x0000000000AA0000-0x0000000000AF0000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/2140-190-0x0000000005620000-0x0000000005630000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/2180-527-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-668-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-642-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-627-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-690-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-682-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/2180-686-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/3272-50-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-691-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-636-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-526-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-683-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-49-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-687-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-272-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-643-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-675-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3272-173-0x0000000000510000-0x00000000008D2000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-692-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-684-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-676-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-637-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-644-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-528-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3364-688-0x0000000000680000-0x0000000000A42000-memory.dmp
                                                Filesize

                                                3.8MB

                                              • memory/3460-680-0x00000000006F0000-0x0000000000BA7000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/3640-279-0x0000000000400000-0x0000000000450000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/4432-678-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-24-0x0000000004AF0000-0x0000000004AF1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-29-0x0000000004B00000-0x0000000004B01000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-28-0x0000000004B10000-0x0000000004B11000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-19-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-83-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-25-0x0000000004A80000-0x0000000004A81000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-148-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-26-0x0000000004A90000-0x0000000004A91000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-689-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-23-0x0000000004AA0000-0x0000000004AA1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-22-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-21-0x0000000004AB0000-0x0000000004AB1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4432-626-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-645-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-20-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-685-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-402-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-640-0x00000000000C0000-0x0000000000596000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/4432-27-0x0000000004AE0000-0x0000000004AE1000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/4940-84-0x00000000737C0000-0x0000000073F70000-memory.dmp
                                                Filesize

                                                7.7MB

                                              • memory/4940-82-0x00000000050C0000-0x00000000050D0000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/4940-75-0x0000000000400000-0x0000000000592000-memory.dmp
                                                Filesize

                                                1.6MB

                                              • memory/4948-666-0x0000000000400000-0x0000000000644000-memory.dmp
                                                Filesize

                                                2.3MB

                                              • memory/4948-662-0x0000000000400000-0x0000000000644000-memory.dmp
                                                Filesize

                                                2.3MB

                                              • memory/5044-151-0x0000000004D30000-0x0000000004D31000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-153-0x0000000004D20000-0x0000000004D21000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-161-0x0000000004D60000-0x0000000004D61000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-158-0x0000000004D00000-0x0000000004D01000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-159-0x0000000004D10000-0x0000000004D11000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-146-0x00000000003C0000-0x0000000000877000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/5044-184-0x0000000004D90000-0x0000000004D91000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-150-0x00000000003C0000-0x0000000000877000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/5044-201-0x00000000003C0000-0x0000000000877000-memory.dmp
                                                Filesize

                                                4.7MB

                                              • memory/5044-187-0x0000000004D80000-0x0000000004D81000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-152-0x0000000004D40000-0x0000000004D41000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5044-156-0x0000000004D70000-0x0000000004D71000-memory.dmp
                                                Filesize

                                                4KB

                                              • memory/5048-72-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
                                                Filesize

                                                64KB

                                              • memory/5048-70-0x0000000000360000-0x000000000051C000-memory.dmp
                                                Filesize

                                                1.7MB

                                              • memory/5048-71-0x00000000737C0000-0x0000000073F70000-memory.dmp
                                                Filesize

                                                7.7MB

                                              • memory/5048-81-0x0000000002810000-0x0000000004810000-memory.dmp
                                                Filesize

                                                32.0MB

                                              • memory/5048-78-0x00000000737C0000-0x0000000073F70000-memory.dmp
                                                Filesize

                                                7.7MB