Analysis Overview
SHA256
53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c
Threat Level: Known bad
The file 53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c was found to be: Known bad.
Malicious Activity Summary
Stealc
Amadey
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Downloads MZ/PE file
Checks computer location settings
Executes dropped EXE
Checks BIOS information in registry
Loads dropped DLL
Reads data files stored by FTP clients
Identifies Wine through registry keys
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious use of NtSetInformationThreadHideFromDebugger
Drops file in Windows directory
Enumerates physical storage devices
Unsigned PE
Suspicious use of FindShellTrayWindow
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Checks processor information in registry
Suspicious use of WriteProcessMemory
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-07-06 10:09
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-07-06 10:09
Reported
2024-07-06 10:11
Platform
win10v2004-20240704-en
Max time kernel
149s
Max time network
153s
Command Line
Signatures
Amadey
Stealc
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Downloads MZ/PE file
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
Checks computer location settings
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| Key value queried | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation | C:\Windows\SysWOW64\cmd.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
Reads data files stored by FTP clients
Reads user/profile data of web browsers
Accesses cryptocurrency files/wallets, possible credential harvesting
Checks installed software on the system
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\explorti.job | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
Enumerates physical storage devices
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\cmd.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe
"C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe"
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe
"C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1000008021\4aabb08a0f.cmd" "
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8038246f8,0x7ff803824708,0x7ff803824718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3032 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4952 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5204 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\BAEBGHCFCA.exe"
C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe
"C:\Users\Admin\AppData\Local\Temp\CBKJJEHCBA.exe"
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15454812137738723068,1318808510575436002,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4896 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 13.107.21.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.21.107.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 57.169.31.20.in-addr.arpa | udp |
| RU | 77.91.77.82:80 | 77.91.77.82 | tcp |
| RU | 77.91.77.81:80 | 77.91.77.81 | tcp |
| US | 8.8.8.8:53 | 81.77.91.77.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 82.77.91.77.in-addr.arpa | udp |
| RU | 85.28.47.30:80 | 85.28.47.30 | tcp |
| US | 8.8.8.8:53 | 30.47.28.85.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.youtube.com | udp |
| GB | 216.58.204.78:443 | www.youtube.com | tcp |
| US | 8.8.8.8:53 | consent.youtube.com | udp |
| GB | 216.58.201.110:443 | consent.youtube.com | tcp |
| US | 8.8.8.8:53 | 110.201.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 99.201.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 234.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 227.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.180.4:443 | www.google.com | tcp |
| US | 8.8.8.8:53 | 4.180.250.142.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| GB | 216.58.201.110:443 | consent.youtube.com | udp |
| RU | 77.91.77.81:80 | 77.91.77.81 | tcp |
| US | 8.8.8.8:53 | 103.169.127.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 171.39.242.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.135.221.88.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 142.250.200.46:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | 46.200.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| GB | 216.58.201.110:443 | consent.youtube.com | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.112.168.52.in-addr.arpa | udp |
Files
memory/2644-0-0x00000000006F0000-0x0000000000BB7000-memory.dmp
memory/2644-1-0x0000000077304000-0x0000000077306000-memory.dmp
memory/2644-2-0x00000000006F1000-0x000000000071F000-memory.dmp
memory/2644-3-0x00000000006F0000-0x0000000000BB7000-memory.dmp
memory/2644-4-0x00000000006F0000-0x0000000000BB7000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
| MD5 | 28e571d4573b9bdbeeaf27b204fee1d9 |
| SHA1 | ad4d75a05f431936933b3572758b806765761ee1 |
| SHA256 | 53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c |
| SHA512 | 800f910316a8cb2c3fdb28afdf1fc0a539375d3d9ce44804f4493dab6a6158a956b9c59f85a55f982f764b20762eef2e803124362e5eed53f2d951f456240332 |
memory/2644-16-0x00000000006F0000-0x0000000000BB7000-memory.dmp
memory/4012-17-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-18-0x0000000000BA1000-0x0000000000BCF000-memory.dmp
memory/4012-19-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-20-0x0000000000BA0000-0x0000000001067000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000006001\71a32b56d6.exe
| MD5 | 58ecb697be82278aeb969f9c2c12e1d4 |
| SHA1 | 962efe904a67f667065350cf5a865d22a8d9b563 |
| SHA256 | c8d2aaa1fc32eab170c96f95884a85e47a025f8d74b66a9e7311cba9ee88d10d |
| SHA512 | 0947b87b1b38d1bcde914e65233a78dc8079f419fc0c0f36e10d4ae2fc07e239b557fa05e899d36ef3158265a7519cf1a83fa44e1d86567ff181c5660966f26c |
memory/3420-36-0x0000000000B60000-0x0000000001747000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\1000008021\4aabb08a0f.cmd
| MD5 | ee00aba3bdbf694bb1588c965a077e3a |
| SHA1 | 00491ccb092d576b62d54172bdc09877d0f74c19 |
| SHA256 | 1aaae392ae43103ba228a64247a82cc41767041f6fa6db20246e3f0d49b29750 |
| SHA512 | 1a05c43de1ac0fdbabe97145e7170a1a399fcf2b8463422049ee1e5b13d42c316e7da0cb39b7e10935fc16e69f88d6a5869e114f1ae4fbed15ffd1b313661e49 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 09c7ae658385f6de986103443217840b |
| SHA1 | 298d880503edce4413337c09d3525f27a2edcd28 |
| SHA256 | 91e04ec38abdb0204458543592c4621b7bc0306407884f764aa9596a52454cd7 |
| SHA512 | 4e1272b209487d1e9e7d8502be49ebce91c76718410e817b3ac7faf47d9b699210aab1b941fbb5ddafc192ddf4b2ba151afd47fab753ec62bc0bca36039c55c3 |
\??\pipe\LOCAL\crashpad_3828_EWTKXNBDOWFPKQWM
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 3c78617ec8f88da19254f9ff03312175 |
| SHA1 | 344e9fed9434d924d1c9f05351259cbc21e434d3 |
| SHA256 | 3cb47fcdca33bb3c8f4acc98424140987235ad79815da4f0e7593e4591ae90ed |
| SHA512 | 5b58675088b0fc2b2d705cb648ea89385b80c7cf908b0f4f95a9acdbd350b50754e1b586202db6a918eef70029fafb210947f3c43c570ecf7657e08939fd7e9c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6499f3456722ff43247080531d884163 |
| SHA1 | 5279d5fb7b244f114e11542329b0986a8dc9bb8b |
| SHA256 | 62edf270174f6a36031ba969bc92737af92c5741f19e9f5e30e639e6acd73497 |
| SHA512 | f0b4b2e3476bc09547b4f0d079ec39196fcc95138e3e7b75c6593cf05a39db1078a1e3315b89951ae8767eb04087561f858362068cf92a273eaed5a6e27083e6 |
memory/3420-78-0x0000000061E00000-0x0000000061EF3000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\ProgramData\nss3.dll
| MD5 | 1cc453cdf74f31e4d913ff9c10acdde2 |
| SHA1 | 6e85eae544d6e965f15fa5c39700fa7202f3aafe |
| SHA256 | ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5 |
| SHA512 | dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571 |
C:\ProgramData\mozglue.dll
| MD5 | c8fd9be83bc728cc04beffafc2907fe9 |
| SHA1 | 95ab9f701e0024cedfbd312bcfe4e726744c4f2e |
| SHA256 | ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a |
| SHA512 | fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040 |
memory/4012-173-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/3420-176-0x0000000000B60000-0x0000000001747000-memory.dmp
memory/380-180-0x00000000003C0000-0x0000000000887000-memory.dmp
memory/380-182-0x00000000003C0000-0x0000000000887000-memory.dmp
memory/4012-183-0x0000000000BA0000-0x0000000001067000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 7dee6c1e0af886db2773efa776448971 |
| SHA1 | 3caa3e7b427f4c3c26f0c2a5a9ccc0e7cc7faee2 |
| SHA256 | 21e1b0cbe5fc6ca915381e1cb3c8fa371cc8b797adee8a40210337e4c979b3d2 |
| SHA512 | e194166a83b0010f4a36fdbede32557e6f17820ddba01f59cf368baa7e704eb98e3c5d0c69a660cf8a3ac067aed97f0347e3b044657dfd3d36ec113f153c536e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6c741c1d759b8c31c4dea2a03ee719a2 |
| SHA1 | e2b7e2fd2314bdbc53ca3254a0b05bffcbc04b4b |
| SHA256 | effdcbcde9b1b60d4b6be1b3323a61f1aad859e6fddddc3ce851556a8ee9680f |
| SHA512 | 642b16a5a05cb7c1383b902d522e7d81e1fe03b41f121ed315edce34b98eacab0fa89e21d014222a6d695814b3466c5614be0b2ce34038e20247124169076d07 |
memory/4012-200-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-201-0x0000000000BA0000-0x0000000001067000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 738c2d47ee749448e15dc2cfe63b97c9 |
| SHA1 | 23ed0f9594c4867d5a2a19cd20a9fa3d9eb5c6a6 |
| SHA256 | 06c54c6af15e5f9ffea81b3606ba95b5efd096d7efcfd41f90796315331a4602 |
| SHA512 | d02506a3376f08f844ae378dcec786f33e1e6c2974bc83e5a53e2f441456ca0c62450f5b170f16628f466002247f2dfa3be80114a7519200ac977c240ca6431b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | b55949372a1f2c57ca99c75d75a7b85e |
| SHA1 | 2d85cfc5597c779d3f7dff34c5951c67c6d0e90f |
| SHA256 | 30f7363c5fb979ddbb9aa56bb8c090ee1c20b97cd805b1103159842d88e96629 |
| SHA512 | 672ee9858406d26314223694da66e20a50959204ad5fb83c576da9f39a45c79d87a32340bac3b419305402b39b1d288d5e1c43c873c134751b122d08e8e733bf |
memory/4012-225-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/2900-227-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/2900-228-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-229-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-230-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-240-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-249-0x0000000000BA0000-0x0000000001067000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 0878680a1bb517e96a55efb1f4fcbac4 |
| SHA1 | d2f2d7baa7cee56a6f27f039a83c4308acae7851 |
| SHA256 | f2eed77a3d7e6f38af3f1fa507cf68fadd95c24efaab779d993dff45baa2db2b |
| SHA512 | d48b13698bb2f75f2c1287c28be7d0cd43a9bec76158cd36d727a423237fa5266ef33559652d85144e48c35ba5ee8debe017545b32bb25d2f13ec9392750db56 |
memory/4012-273-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-274-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/3132-276-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-277-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-278-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-279-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-282-0x0000000000BA0000-0x0000000001067000-memory.dmp
memory/4012-285-0x0000000000BA0000-0x0000000001067000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-07-06 10:09
Reported
2024-07-06 10:11
Platform
win11-20240508-en
Max time kernel
146s
Max time network
152s
Command Line
Signatures
Amadey
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Identifies Wine through registry keys
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| Key opened | \REGISTRY\USER\S-1-5-21-1672260578-815027929-964132517-1000\Software\Wine | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\Tasks\explorti.job | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
Enumerates physical storage devices
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4420 wrote to memory of 1144 | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe |
| PID 4420 wrote to memory of 1144 | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe |
| PID 4420 wrote to memory of 1144 | N/A | C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe | C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe
"C:\Users\Admin\AppData\Local\Temp\53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c.exe"
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
Network
| Country | Destination | Domain | Proto |
| RU | 77.91.77.82:80 | tcp | |
| RU | 77.91.77.82:80 | tcp | |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
Files
memory/4420-0-0x0000000000810000-0x0000000000CD7000-memory.dmp
memory/4420-1-0x00000000774E6000-0x00000000774E8000-memory.dmp
memory/4420-2-0x0000000000811000-0x000000000083F000-memory.dmp
memory/4420-3-0x0000000000810000-0x0000000000CD7000-memory.dmp
memory/4420-5-0x0000000000810000-0x0000000000CD7000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
| MD5 | 28e571d4573b9bdbeeaf27b204fee1d9 |
| SHA1 | ad4d75a05f431936933b3572758b806765761ee1 |
| SHA256 | 53188c5bd473240d4307ec137e20df4fe7f2e50864e5a888f7f30be49c988d0c |
| SHA512 | 800f910316a8cb2c3fdb28afdf1fc0a539375d3d9ce44804f4493dab6a6158a956b9c59f85a55f982f764b20762eef2e803124362e5eed53f2d951f456240332 |
memory/4420-17-0x0000000000810000-0x0000000000CD7000-memory.dmp
memory/1144-18-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-19-0x0000000000DA1000-0x0000000000DCF000-memory.dmp
memory/1144-20-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-21-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-22-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-23-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-24-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-25-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-26-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1532-28-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1532-29-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1532-30-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1532-31-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-32-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-33-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-34-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-35-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-36-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-37-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1348-39-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1348-40-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-41-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-42-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-43-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-44-0x0000000000DA0000-0x0000000001267000-memory.dmp
memory/1144-45-0x0000000000DA0000-0x0000000001267000-memory.dmp