Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-03-2024 11:26

General

  • Target

    ca0f8d0ff7eb4c1e84886a2d09f22f0516c019dc79f93ccd30cfa1773970891e.exe

  • Size

    1.8MB

  • MD5

    9a35e62d8276e34994a6beb80121adb1

  • SHA1

    55bf11eb3f1a4b742e340993ffbd3f1cf019e27f

  • SHA256

    ca0f8d0ff7eb4c1e84886a2d09f22f0516c019dc79f93ccd30cfa1773970891e

  • SHA512

    677bcb0f2ba6b7a6abd36ad3f7759192bb4bb88158c4c9b57d27f5249b57c3e2ece6fe4569f48e225a0665bbbd82a47485d8870e054fc1a28c27ecbf86f64ee2

  • SSDEEP

    49152:jv3vD+vwZsaPY0iXnDMmT9i/FT+I80Y+oK:rDPY0izZo/AoS

Malware Config

Extracted

Family

amadey

Version

4.18

C2

http://193.233.132.56

Attributes
  • install_dir

    09fd851a4f

  • install_file

    explorha.exe

  • strings_key

    443351145ece4966ded809641c77cfa8

  • url_paths

    /Pneh2sXQk0/index.php

rc4.plain

Extracted

Family

amadey

Version

4.17

C2

http://185.215.113.32

Attributes
  • install_dir

    00c07260dc

  • install_file

    explorgu.exe

  • strings_key

    461809bd97c251ba0c0c8450c7055f1d

  • url_paths

    /yandex/index.php

rc4.plain

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RisePro

    RisePro stealer is an infostealer distributed by PrivateLoader.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 6 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads local data of messenger clients 2 TTPs

    Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ca0f8d0ff7eb4c1e84886a2d09f22f0516c019dc79f93ccd30cfa1773970891e.exe
    "C:\Users\Admin\AppData\Local\Temp\ca0f8d0ff7eb4c1e84886a2d09f22f0516c019dc79f93ccd30cfa1773970891e.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
      "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:312
      • C:\Users\Admin\AppData\Local\Temp\1000042001\bf99510ac7.exe
        "C:\Users\Admin\AppData\Local\Temp\1000042001\bf99510ac7.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        PID:1800
      • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
        "C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe"
        3⤵
          PID:3820
        • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe
          "C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2340
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4056
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe789e46f8,0x7ffe789e4708,0x7ffe789e4718
              5⤵
                PID:832
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,15973265103053436536,18418977011677857139,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
                5⤵
                  PID:712
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,15973265103053436536,18418977011677857139,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:3
                  5⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1528
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                4⤵
                • Enumerates system info in registry
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2448
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe789e46f8,0x7ffe789e4708,0x7ffe789e4718
                  5⤵
                    PID:2892
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                    5⤵
                      PID:4204
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:3
                      5⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:4344
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
                      5⤵
                        PID:2204
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                        5⤵
                          PID:2060
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:1
                          5⤵
                            PID:3544
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:1
                            5⤵
                              PID:5292
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:1
                              5⤵
                                PID:5536
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                                5⤵
                                  PID:5720
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:1
                                  5⤵
                                    PID:5832
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                                    5⤵
                                      PID:5308
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5724 /prefetch:8
                                      5⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5508
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:1
                                      5⤵
                                        PID:5728
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:1
                                        5⤵
                                          PID:5656
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:1
                                          5⤵
                                            PID:5364
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:1
                                            5⤵
                                              PID:5444
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,13165404215276643015,15585469254578625604,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3712 /prefetch:2
                                              5⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4516
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                            4⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:1348
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffe789e46f8,0x7ffe789e4708,0x7ffe789e4718
                                              5⤵
                                                PID:1968
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1464,12571102978914469288,15056397813400718415,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 /prefetch:3
                                                5⤵
                                                  PID:5492
                                            • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe"
                                              3⤵
                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                              • Checks BIOS information in registry
                                              • Executes dropped EXE
                                              • Identifies Wine through registry keys
                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                              • Drops file in Windows directory
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:5256
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                              3⤵
                                              • Loads dropped DLL
                                              PID:4332
                                              • C:\Windows\system32\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                4⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:2740
                                                • C:\Windows\system32\netsh.exe
                                                  netsh wlan show profiles
                                                  5⤵
                                                    PID:5132
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\660967641992_Desktop.zip' -CompressionLevel Optimal
                                                    5⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5612
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                3⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                PID:5228
                                          • C:\Windows\System32\CompPkgSrv.exe
                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                            1⤵
                                              PID:5228
                                            • C:\Windows\System32\CompPkgSrv.exe
                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                              1⤵
                                                PID:5364
                                              • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:772
                                              • C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                C:\Users\Admin\AppData\Local\Temp\00c07260dc\explorgu.exe
                                                1⤵
                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                • Checks BIOS information in registry
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Identifies Wine through registry keys
                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:4588
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                  2⤵
                                                  • Loads dropped DLL
                                                  PID:1188
                                                  • C:\Windows\system32\rundll32.exe
                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
                                                    3⤵
                                                    • Blocklisted process makes network request
                                                    • Loads dropped DLL
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5160
                                                    • C:\Windows\system32\netsh.exe
                                                      netsh wlan show profiles
                                                      4⤵
                                                        PID:5252
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -Command Compress-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\660967641992_Desktop.zip' -CompressionLevel Optimal
                                                        4⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5136
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                                                    2⤵
                                                    • Blocklisted process makes network request
                                                    • Loads dropped DLL
                                                    PID:4436
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6004
                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                  1⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1360

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                  Filesize

                                                  3KB

                                                  MD5

                                                  fe3aab3ae544a134b68e881b82b70169

                                                  SHA1

                                                  926e9b4e527ae1bd9b3b25726e1f59d5a34d36a6

                                                  SHA256

                                                  bda499e3f69d8fe0227e734bbb935dc5bf0050d37adf03bc41356dfcb5bcca0b

                                                  SHA512

                                                  3fbd3499d98280b6c79c67b0ee183b27692dbc31acf103b4f8ca4dcdf392afff2b3aad500037f4288581ed37e85f45c3bbb5dcde11cddf3ef0609f44b2ecb280

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  e1b45169ebca0dceadb0f45697799d62

                                                  SHA1

                                                  803604277318898e6f5c6fb92270ca83b5609cd5

                                                  SHA256

                                                  4c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60

                                                  SHA512

                                                  357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                  Filesize

                                                  152B

                                                  MD5

                                                  9ffb5f81e8eccd0963c46cbfea1abc20

                                                  SHA1

                                                  a02a610afd3543de215565bc488a4343bb5c1a59

                                                  SHA256

                                                  3a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc

                                                  SHA512

                                                  2d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                  Filesize

                                                  960B

                                                  MD5

                                                  2ecda8ee0336a10dfa86e5f3747907db

                                                  SHA1

                                                  7cca9196f5e996baa025cffd2388b70a8748a17e

                                                  SHA256

                                                  592865ecca0d84b615005036fac50cfb7e712fdc69bd4970dd4eb28edc3590e7

                                                  SHA512

                                                  8c914faafd685d6d5ed51beaa6b9ad7a9376f38f6bee2e4a2ea49a5767501f251d14330bb3633411cf52dd112a928003c4cb4cba32f1ecf151933633023dad03

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  aacc59b8b133d2e4a10aec1aa71c6d0e

                                                  SHA1

                                                  52334109d8edf6d72d621534717921e2bcb1a1a4

                                                  SHA256

                                                  f0e829d90c5282176ca688ac3d2329ac21a24d6ba06d8a98476e850d4de27f87

                                                  SHA512

                                                  b6adbded9aebba659d1ae55a4a57893b791dd8811befff2661d8bcb1f13c55d07bfd82d96ac4ce1b858ea3a5b8f6e1c36018d348f52df728e90236bca02cbedc

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                  Filesize

                                                  2KB

                                                  MD5

                                                  d7d7b951769559c8384529d883b27921

                                                  SHA1

                                                  4aac555a109170f21fa2e680d98dfdb377b3929a

                                                  SHA256

                                                  88bab3c0dd87313207f4df9958ecad2c18336c995a4efef1213ec24e0e01274b

                                                  SHA512

                                                  378b179a4a95587d448e224493d3eb12b0287820862390022728b86aa7b94633af7527ad88e7ccd2cd0ac86801293319e24b6ac43c71efeedbc31cdd6db7027c

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  6KB

                                                  MD5

                                                  0baae33ab85e1646100f9ce6637d5f0a

                                                  SHA1

                                                  3da770c8d9c1a703c94e239f982acf8ecea90616

                                                  SHA256

                                                  85cf62de9dbdbaa91da72cdab1d3013a71c86e7950ab6058f43a9b5ef0a717c9

                                                  SHA512

                                                  65c7f21e7ed45ec2bdf01d2ebc6369df02d7307d992760ba13a542ab8aa8493fb1e7e1d5a4669d4843ae75f6aaddeec41edf6a80642098e5ad469fe78905f909

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                  Filesize

                                                  7KB

                                                  MD5

                                                  01176740728602b689ac8ef94e463ee4

                                                  SHA1

                                                  2d7b84ece42e57129f49ad9b6a2d7cfd315f9cbb

                                                  SHA256

                                                  9decfa8df7f1106e7a260523eb024dc1b1ef5ffc4851049591c2ce707eb7a9b9

                                                  SHA512

                                                  f305a3c9f60427710441617d1ba8f68e10c1911e7ac75ccfc25d8b01d03824f938b59b3aabc3ba2bd7e128832524f54c0963be3c0ec90b8c44f6b465fea25ae5

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  f1d2b8dd93355f543f5c3897df71c3ea

                                                  SHA1

                                                  004ef1124d604c246441a32926cbd15d97bc5104

                                                  SHA256

                                                  6ebb4975545c0fa7028cdb51fef8fb6eefa54c14cf0af3a80308662122cfb2ce

                                                  SHA512

                                                  10e442075a1cdd204185d6aeef6d2ee66b2c6072107456a348aa2fde7ad15557454a52fab09df5a1e40b7329ff2476167d6a8df13ea4f5886e9faab105e399ea

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  feee920e383def60dacd49fdb4926b65

                                                  SHA1

                                                  09fe062d2c1733a588fe538f0fb60db2ab770607

                                                  SHA256

                                                  06893b3a8662f2afd82f4066e54c4b0b511b801acceb836a3bc42d51de47bfc5

                                                  SHA512

                                                  3ff7444ae74bfff6365d2c57ea066c60073651f6a28e39191aa74eb4f5e8b47e1aab25bd48c5df835092ea20a4ee203e8e5268be8e30c24ee8e38ced7188ba13

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  62daef68f040613d6eaffc9bcbb70f5b

                                                  SHA1

                                                  0f8f0e70f11e853b959ab267ede621451080b938

                                                  SHA256

                                                  1d46f764cee89f299b1b46a931e2f16090426e13aa1e92610bfba4c681963833

                                                  SHA512

                                                  8fed79fb748cedc02c8606f9fa794acfea69d57903f1ae9215cf5d22d3679e8d140bf0d817ec9bb36bc57b06a81aa9f976cef5a2db4183b70b7731c17fc1e002

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                  Filesize

                                                  707B

                                                  MD5

                                                  94f02bf7939c641f20d32d715aba0150

                                                  SHA1

                                                  0d1823c4e4483f10a03b89b78aa93b6a31a3338b

                                                  SHA256

                                                  6410bd24148b2cee9fa9eb96124806b2bc0babf7aacc93cced85169a91f870c4

                                                  SHA512

                                                  060c649937f23fb645364bde0bbd5b3928907b929fed5931c9b0be0c8cc4367f808f64ca5dc897b74c59f13fa7b10e48683aa52958e9289dcda4532a8703f022

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57b95d.TMP

                                                  Filesize

                                                  707B

                                                  MD5

                                                  b4fbbc80d4259722e76e9d23974a764e

                                                  SHA1

                                                  19b3198c67bc01c6028867c454263b259275095b

                                                  SHA256

                                                  c8e70d2a8c9243d2d183368b1cc9ddc4e73e15a13dfcab82dd19b3b67adcc138

                                                  SHA512

                                                  6680b2d25aee2f836192bf00b7ab11d73e3670f75c4aa8bbf66664822799b447fd399d53e0dded1562d7539af6cac2b1207e31ea14d94f99e89ddc5facc9d5bf

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                  Filesize

                                                  16B

                                                  MD5

                                                  6752a1d65b201c13b62ea44016eb221f

                                                  SHA1

                                                  58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                  SHA256

                                                  0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                  SHA512

                                                  9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  422f234305d90264af38fcae131fa7d2

                                                  SHA1

                                                  645594832e78db8548a902dd6d02ac1b0a170a88

                                                  SHA256

                                                  6cce6448add367a3e2521d3060872da5ec88823549f3bd0d286f67ed96247969

                                                  SHA512

                                                  af71f12e17c4fde6ac53ff3561cd8c9fa7b4c586299390a32fd1cc6ab63799affa4db5f99c09a425cdf1b31ad6a9f0afdd1d52667fe41ad4fcf69d472d76ed4e

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  8KB

                                                  MD5

                                                  eae971c20ea0ff4d518df580614bcdfb

                                                  SHA1

                                                  d3735090a6f28b543be8fccb4a046cb642a79f93

                                                  SHA256

                                                  dd5836923e9ea3ac3949631d30a7ad7ffbd28482c6327353d3f159d3ab491637

                                                  SHA512

                                                  5507079224608fd997fef6d0143729a99e2857050aeac1bf7da18ba322a9960547a64bffca9ed4ebce78c13b581e216f1967d8c7ec4a0fc2e1409b1f57b01498

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  52edef91a1cc655bb569516d8dde27a6

                                                  SHA1

                                                  a694a0e467bf1ef255b0e3976c8cda041806f8ca

                                                  SHA256

                                                  c1369e459f0c53850e2dbe76c85980f9ffd65ea5f39be3736dd991e2f9dc50c8

                                                  SHA512

                                                  c978fdc55487d9eca895d460c87e2632e22d43dc2f9e2b97bc3c1904b139e8825f52a1aae11bcfe99c700033dbf797f3fa34b2ab0279d869ee48db9db0c0783a

                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                  Filesize

                                                  11KB

                                                  MD5

                                                  95f109cf12e0714ed3036813169f3211

                                                  SHA1

                                                  368df337a8eb0335db682abbd87ee2d4b5ac1426

                                                  SHA256

                                                  4ad03989e43c9c4b04efebfe8688e07a31cc16139fe29135988f0c6296263698

                                                  SHA512

                                                  2319789799ba5506229f64993817518beb0e0f5649f0f75a0a37634d19d2f54cce1327ae7cbdf57ba01d37485f0cdf4fc2ce577fda1165de122a42a093732770

                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  2730b7b80e5162a8019025bbea798685

                                                  SHA1

                                                  69b6904d93ad582be522851e1b138c7b6fbcc0ed

                                                  SHA256

                                                  f4365abd73df4d70be9dcc12dc128f8ad504add56e13b2e245ccadd4322a7290

                                                  SHA512

                                                  d00ad4fdd762dba4babc8222c6b3a7747a67bf708abe6e5dba06378a88ad7312e69b1987896439f43fb652a0b71afec511b3e7cb4d9d43d92659632015da5771

                                                • C:\Users\Admin\AppData\Local\Temp\09fd851a4f\explorha.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  9a35e62d8276e34994a6beb80121adb1

                                                  SHA1

                                                  55bf11eb3f1a4b742e340993ffbd3f1cf019e27f

                                                  SHA256

                                                  ca0f8d0ff7eb4c1e84886a2d09f22f0516c019dc79f93ccd30cfa1773970891e

                                                  SHA512

                                                  677bcb0f2ba6b7a6abd36ad3f7759192bb4bb88158c4c9b57d27f5249b57c3e2ece6fe4569f48e225a0665bbbd82a47485d8870e054fc1a28c27ecbf86f64ee2

                                                • C:\Users\Admin\AppData\Local\Temp\1000042001\bf99510ac7.exe

                                                  Filesize

                                                  3.0MB

                                                  MD5

                                                  cb1bbca75a3bcbfb2f40d8ada483f37d

                                                  SHA1

                                                  82192d7c52c1cbbd944e2cccf0795bb6f8310423

                                                  SHA256

                                                  ceaefd25ad7b260c2cb6026dcabeeb34eae2cf6110ba8f9a19a197d13731c804

                                                  SHA512

                                                  1e7277edffce945100ffa8a5023c454c2787c244ddd0964f9b1fcad85394f6ef4548f9d9aeb7e27adb6fe7b950987a04953c1ed5ebdfc2110dfd14c43e1821a9

                                                • C:\Users\Admin\AppData\Local\Temp\1000044001\go.exe

                                                  Filesize

                                                  894KB

                                                  MD5

                                                  2f8912af892c160c1c24c9f38a60c1ab

                                                  SHA1

                                                  d2deae508e262444a8f15c29ebcc7ebbe08a3fdb

                                                  SHA256

                                                  59ff8e0aa665fbbf749c7548906a655cb1869bb58a3b7546efa5b416d19e6308

                                                  SHA512

                                                  0395383bde98d358b0a7f2224f903dff026ce0c6d90feb49ac0e6993ef692143b0eb25da84d9cdc9e7b373a7b75a6dbaef14746eda1bff165d59f07ca51a16bb

                                                • C:\Users\Admin\AppData\Local\Temp\1000046001\amert.exe

                                                  Filesize

                                                  1.8MB

                                                  MD5

                                                  110d28ea1f4b9b3bdf8df3de777c693d

                                                  SHA1

                                                  4c94c834a8ee46a277c8a9da066e062c41c1d1c8

                                                  SHA256

                                                  d9a03ce734159b193c74fb0169867dd08d7b56f0b8886b46c28f67defd912463

                                                  SHA512

                                                  bb177fb9fbf9cfdedb481b39d17bc95eb17479cdce86a098339ccb248a558aa4bcea9795462c91e94879d05ceff44449c98b437af5502666365d24d7ac98f678

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ykza4yxa.ind.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  2afdbe3b99a4736083066a13e4b5d11a

                                                  SHA1

                                                  4d4856cf02b3123ac16e63d4a448cdbcb1633546

                                                  SHA256

                                                  8d31b39170909595b518b1a03e9ec950540fabd545ed14817cac5c84b91599ee

                                                  SHA512

                                                  d89b3c46854153e60e3fa825b394344eee33936d7dbf186af9d95c9adae54428609e3bf21a18d38fce3d96f3e0b8e4e0ed25cb5004fbe288de3aef3a85b1d93f

                                                • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  92fbdfccf6a63acef2743631d16652a7

                                                  SHA1

                                                  971968b1378dd89d59d7f84bf92f16fc68664506

                                                  SHA256

                                                  b4588feacc183cd5a089f9bb950827b75df04bd5a6e67c95ff258e4a34aa0d72

                                                  SHA512

                                                  b8ea216d4a59d8858fd4128abb555f8dcf3acca9138e663b488f09dc5200db6dc11ecc235a355e801145bbbb44d7beac6147949d75d78b32fe9cfd2fa200d117

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll

                                                  Filesize

                                                  109KB

                                                  MD5

                                                  726cd06231883a159ec1ce28dd538699

                                                  SHA1

                                                  404897e6a133d255ad5a9c26ac6414d7134285a2

                                                  SHA256

                                                  12fef2d5995d671ec0e91bdbdc91e2b0d3c90ed3a8b2b13ddaa8ad64727dcd46

                                                  SHA512

                                                  9ea82e7cb6c6a58446bd5033855947c3e2d475d2910f2b941235e0b96aa08eec822d2dd17cc86b2d3fce930f78b799291992408e309a6c63e3011266810ea83e

                                                • C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dll

                                                  Filesize

                                                  1.2MB

                                                  MD5

                                                  15a42d3e4579da615a384c717ab2109b

                                                  SHA1

                                                  22aeedeb2307b1370cdab70d6a6b6d2c13ad2301

                                                  SHA256

                                                  3c97bb410e49b11af8116feb7240b7101e1967cae7538418c45c3d2e072e8103

                                                  SHA512

                                                  1eb7f126dccc88a2479e3818c36120f5af3caa0d632b9ea803485ee6531d6e2a1fd0805b1c4364983d280df23ea5ca3ad4a5fca558ac436efae36af9b795c444

                                                • \??\pipe\LOCAL\crashpad_2448_LQHLAVBBLMFANBMH

                                                  MD5

                                                  d41d8cd98f00b204e9800998ecf8427e

                                                  SHA1

                                                  da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                  SHA256

                                                  e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                  SHA512

                                                  cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                • memory/312-489-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-380-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-454-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-32-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-31-0x0000000004AE0000-0x0000000004AE1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-181-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-23-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-24-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-415-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-591-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-506-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-586-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-513-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-25-0x0000000004A80000-0x0000000004A81000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-571-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-253-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-26-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-568-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-30-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-29-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-27-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-28-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/312-565-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-539-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/312-562-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/772-392-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/772-411-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/772-402-0x0000000005260000-0x0000000005261000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-403-0x00000000052B0000-0x00000000052B1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-401-0x0000000005250000-0x0000000005251000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-397-0x0000000005280000-0x0000000005281000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-398-0x0000000005290000-0x0000000005291000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-400-0x00000000052C0000-0x00000000052C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-399-0x0000000005270000-0x0000000005271000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/772-396-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/916-7-0x0000000004CE0000-0x0000000004CE1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-1-0x0000000077C04000-0x0000000077C06000-memory.dmp

                                                  Filesize

                                                  8KB

                                                • memory/916-2-0x0000000000140000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/916-8-0x0000000004CF0000-0x0000000004CF1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-21-0x0000000000140000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/916-6-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-5-0x0000000004D00000-0x0000000004D01000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-10-0x0000000004D50000-0x0000000004D51000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-4-0x0000000004D20000-0x0000000004D21000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-9-0x0000000004D60000-0x0000000004D61000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-3-0x0000000004D10000-0x0000000004D11000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/916-0-0x0000000000140000-0x00000000005E6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1360-611-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB

                                                • memory/1800-582-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-499-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-588-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-509-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-349-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-412-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-52-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-476-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-515-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-569-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-612-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-566-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-363-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-440-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-563-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-561-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/1800-51-0x0000000000A30000-0x0000000000DEA000-memory.dmp

                                                  Filesize

                                                  3.7MB

                                                • memory/4588-414-0x00000000054B0000-0x00000000054B1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-570-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-602-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-439-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-413-0x00000000054C0000-0x00000000054C1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-477-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-410-0x0000000005440000-0x0000000005441000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-408-0x0000000005430000-0x0000000005431000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-409-0x0000000005450000-0x0000000005451000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-407-0x0000000005490000-0x0000000005491000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-500-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-405-0x0000000005470000-0x0000000005471000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-507-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-406-0x0000000005460000-0x0000000005461000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/4588-404-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-514-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-394-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-587-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-581-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-455-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-550-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-567-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/4588-564-0x0000000000CA0000-0x0000000001151000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5136-457-0x00007FFE747A0000-0x00007FFE75261000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5256-202-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-206-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-249-0x0000000004AC0000-0x0000000004AC1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-199-0x0000000000800000-0x0000000000CB1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5256-207-0x0000000004A40000-0x0000000004A41000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-266-0x0000000000800000-0x0000000000CB1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5256-254-0x0000000004AB0000-0x0000000004AB1000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-200-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-191-0x0000000000800000-0x0000000000CB1000-memory.dmp

                                                  Filesize

                                                  4.7MB

                                                • memory/5256-201-0x0000000004A60000-0x0000000004A61000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5256-203-0x0000000004A30000-0x0000000004A31000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/5612-346-0x00007FFE747A0000-0x00007FFE75261000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5612-351-0x0000017D64ED0000-0x0000017D64EE2000-memory.dmp

                                                  Filesize

                                                  72KB

                                                • memory/5612-358-0x00007FFE747A0000-0x00007FFE75261000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/5612-348-0x0000017D4C450000-0x0000017D4C460000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5612-350-0x0000017D4C450000-0x0000017D4C460000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/5612-352-0x0000017D64EC0000-0x0000017D64ECA000-memory.dmp

                                                  Filesize

                                                  40KB

                                                • memory/5612-341-0x0000017D64B40000-0x0000017D64B62000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/5612-347-0x0000017D4C450000-0x0000017D4C460000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/6004-560-0x0000000000910000-0x0000000000DB6000-memory.dmp

                                                  Filesize

                                                  4.6MB