Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24-07-2024 03:00

General

  • Target

    00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe

  • Size

    678KB

  • MD5

    686443cb145ea6d01fbe1e0e329a6ba3

  • SHA1

    949d2881fd068dbe8da7bec7910d27e81daf83cb

  • SHA256

    00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456

  • SHA512

    f8b3cd2d58a25eeecfc96b7fd71e2d0b8a0dc866eaa8fc28b92498bc300957b9a70f12607c0e532d331232772cb243b82bf82b966cd7f1a3a63ef92d7fe1c67e

  • SSDEEP

    12288:+KMxo7YNQB2YcKify3idXmen/UmM6+6pTwUgh/r/0zGg1XZ:/MKwQ8siK3hwC96c/OG

Malware Config

Extracted

Family

stealc

Botnet

sila

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Extracted

Family

amadey

Version

4.30

Botnet

4dd39d

C2

http://77.91.77.82

Attributes
  • install_dir

    ad40971b6b

  • install_file

    explorti.exe

  • strings_key

    a434973ad22def7137dbb5e059b7081e

  • url_paths

    /Hun4Ko/index.php

rc4.plain

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

1307newbild

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 19 IoCs
  • Identifies Wine through registry keys 2 TTPs 4 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 43 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 22 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 62 IoCs
  • Suspicious use of FindShellTrayWindow 41 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe
    "C:\Users\Admin\AppData\Local\Temp\00a10d07277a7230bf72e4a77a4fd0a7b7b8d031e671e16432f7838676cb2456.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminCFHCGHJDBF.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\AdminCFHCGHJDBF.exe
        "C:\Users\AdminCFHCGHJDBF.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        PID:1628
        • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
          "C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:1716
          • C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe
            "C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:3804
          • C:\Users\Admin\AppData\Local\Temp\1000021001\d390ab4cb4.exe
            "C:\Users\Admin\AppData\Local\Temp\1000021001\d390ab4cb4.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:4068
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\AdminDHDAKFCGIJ.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\AdminDHDAKFCGIJ.exe
        "C:\Users\AdminDHDAKFCGIJ.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Windows\system32\cmd.exe
          "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\139.tmp\13A.tmp\13B.bat C:\Users\AdminDHDAKFCGIJ.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1248
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" "https://www.youtube.com/account"
            5⤵
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1872
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6af9758,0x7fef6af9768,0x7fef6af9778
              6⤵
                PID:1936
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1156 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:2
                6⤵
                  PID:616
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1528 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:8
                  6⤵
                    PID:1728
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:8
                    6⤵
                      PID:2120
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2188 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:1
                      6⤵
                        PID:1632
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2196 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:1
                        6⤵
                          PID:1000
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1596 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:2
                          6⤵
                            PID:3348
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2144 --field-trial-handle=1016,i,7932930902722052174,9995176720038758282,131072 /prefetch:1
                            6⤵
                              PID:3412
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" "https://www.youtube.com/account"
                            5⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2352
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account
                              6⤵
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of WriteProcessMemory
                              PID:2844
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.0.682515419\826343814" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1224 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9354769-7458-40ce-adf2-e09416c9b7ad} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 1296 10fd5758 gpu
                                7⤵
                                  PID:1368
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.1.32186820\658189061" -parentBuildID 20221007134813 -prefsHandle 1500 -prefMapHandle 1496 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da2893ab-71e8-4425-8eec-2c9efb547f8b} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 1512 fded258 socket
                                  7⤵
                                    PID:1772
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.2.133988477\1173405558" -childID 1 -isForBrowser -prefsHandle 2036 -prefMapHandle 2032 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83e95eaf-32b3-45e9-92da-2ee959a6c02e} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 2052 1ab81158 tab
                                    7⤵
                                      PID:1996
                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.3.303395543\1574646392" -childID 2 -isForBrowser -prefsHandle 2600 -prefMapHandle 2592 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e45224a-89e7-4d9d-a37f-c7a293c61f4c} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 2612 1bcbd158 tab
                                      7⤵
                                        PID:1156
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.4.323239224\1314293220" -childID 3 -isForBrowser -prefsHandle 3832 -prefMapHandle 3676 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {939b752b-ca27-4f84-beb7-d0ea4f74980d} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 3844 1fc5a858 tab
                                        7⤵
                                          PID:4012
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.5.1263542176\2012375718" -childID 4 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e6df14b-324e-4486-934a-7f9b6815e11d} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 3936 1fc58758 tab
                                          7⤵
                                            PID:4020
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2844.6.1984287728\415427488" -childID 5 -isForBrowser -prefsHandle 4124 -prefMapHandle 4128 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {88a5f583-8ae9-4298-8c10-c1213d1d0e7f} 2844 "\\.\pipe\gecko-crash-server-pipe.2844" 4112 1fc5a558 tab
                                            7⤵
                                              PID:4036
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\RoamingFCGIJKJJKE.exe"
                                    2⤵
                                    • Loads dropped DLL
                                    • System Location Discovery: System Language Discovery
                                    PID:3096
                                    • C:\Users\Admin\AppData\RoamingFCGIJKJJKE.exe
                                      "C:\Users\Admin\AppData\RoamingFCGIJKJJKE.exe"
                                      3⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Identifies Wine through registry keys
                                      • Loads dropped DLL
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      • Drops file in Windows directory
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      PID:3156
                                      • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                        "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
                                        4⤵
                                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                        • Checks BIOS information in registry
                                        • Executes dropped EXE
                                        • Identifies Wine through registry keys
                                        • Loads dropped DLL
                                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3980
                                        • C:\Users\Admin\AppData\Local\Temp\1000160001\Files.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000160001\Files.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:3188
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3188 -s 108
                                            6⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:1824
                                        • C:\Users\Admin\AppData\Local\Temp\1000193001\judit1.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000193001\judit1.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:3284
                                          • C:\Users\Admin\AppData\Local\Temp\onefile_3284_133662636578905000\stub.exe
                                            "C:\Users\Admin\AppData\Local\Temp\1000193001\judit1.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:2644
                                        • C:\Users\Admin\AppData\Local\Temp\1000202001\54gtxx.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000202001\54gtxx.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2056
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 108
                                            6⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:2856
                                        • C:\Users\Admin\AppData\Local\Temp\1000240001\newstart.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000240001\newstart.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:3776
                                        • C:\Users\Admin\AppData\Local\Temp\1000259001\gold.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000259001\gold.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:3184
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3184 -s 108
                                            6⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:3288
                                        • C:\Users\Admin\AppData\Local\Temp\1000304001\acev.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000304001\acev.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:2288
                                        • C:\Users\Admin\AppData\Local\Temp\1000313001\newwork.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000313001\newwork.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          PID:3264
                                          • C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe
                                            "C:\Users\Admin\AppData\Local\Temp\9b26cd18f9\Hkbsse.exe"
                                            6⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • System Location Discovery: System Language Discovery
                                            • Modifies system certificate store
                                            PID:3276
                                            • C:\Users\Admin\AppData\Local\Temp\1000007001\2.exe
                                              "C:\Users\Admin\AppData\Local\Temp\1000007001\2.exe"
                                              7⤵
                                              • Executes dropped EXE
                                              PID:3948
                                        • C:\Users\Admin\AppData\Local\Temp\1000339001\RobloxPlayerInstaller.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000339001\RobloxPlayerInstaller.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2504
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c timeout 10 & exit
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3840
                                            • C:\Windows\SysWOW64\timeout.exe
                                              timeout 10
                                              7⤵
                                              • System Location Discovery: System Language Discovery
                                              • Delays execution with timeout.exe
                                              PID:2292
                                        • C:\Users\Admin\AppData\Local\Temp\1000340001\lobo.exe
                                          "C:\Users\Admin\AppData\Local\Temp\1000340001\lobo.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:2552
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 188
                                            6⤵
                                            • Loads dropped DLL
                                            • Program crash
                                            PID:2604
                                • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                  1⤵
                                    PID:2660

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\AdminDHDAKFCGIJ.exe

                                    Filesize

                                    89KB

                                    MD5

                                    cdc49141ee13cb85e87005af8c7c573d

                                    SHA1

                                    829f005938823c1adfd687d369052014d55f82b1

                                    SHA256

                                    772941fe341ea4cd970ed71624adee2b8e340f40104eb786f2a7e26e72189b3b

                                    SHA512

                                    570cd308ea7924ec89da2121f9993b68a273aeb4ccf6aa44a5f5bccbd658d21f8fe628944b6552c6bc8432d770cc45f79852974fc6b23a7a04457787379059f1

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    f50f89a0a91564d0b8a211f8921aa7de

                                    SHA1

                                    112403a17dd69d5b9018b8cede023cb3b54eab7d

                                    SHA256

                                    b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                    SHA512

                                    bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\000007.dbtmp

                                    Filesize

                                    16B

                                    MD5

                                    18e723571b00fb1694a3bad6c78e4054

                                    SHA1

                                    afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                    SHA256

                                    8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                    SHA512

                                    43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\i7f18jmm.default-release\activity-stream.discovery_stream.json.tmp

                                    Filesize

                                    23KB

                                    MD5

                                    97eb1e0e0afd18c7428d2e4c8f354754

                                    SHA1

                                    647997ce570ee286317f3e626eb19b8e674e36e5

                                    SHA256

                                    dc76238e86d547e80e6ca6239829aea2ae868542c34c51c0b1afc3f7108ab166

                                    SHA512

                                    a7175f8f8cfd19f234ee7083144804f26c436a003f098412035d435a0459bb23d5b2c3eddb8d0d1727dcce221e8b369666ed7e30b1299a1e9c05093b4b302f75

                                  • C:\Users\Admin\AppData\Local\Temp\1000007001\2.exe

                                    Filesize

                                    269KB

                                    MD5

                                    d599b3a0b5dd11d352f8766cee826266

                                    SHA1

                                    ec7261ed814f45f319af7b02a297a2ad1f86fdee

                                    SHA256

                                    d0a82db6c276d4f983587224d7994d20b5eb00c779bcd2a51783ca930ea7bcee

                                    SHA512

                                    bf7724af548dd969174a85f206ef7b7fe29f7511cc9bc73620aecd6e6821466ffe32ac3edd1484819f6ec93e81619c2d393c7c1a07cc0a67184ff61673f8b82b

                                  • C:\Users\Admin\AppData\Local\Temp\1000021001\d390ab4cb4.exe

                                    Filesize

                                    287KB

                                    MD5

                                    f04052fb093c0ffe4484abbdac0d1cf1

                                    SHA1

                                    58dbf4a9ddd955e03032efc4c9cb97e13f67aa7c

                                    SHA256

                                    dae56bc934663460f6cece9445ff4c10183f33054c67be434b5af40245ddce59

                                    SHA512

                                    b8a5c5f0cd5e023df8f2af5c31a893acd218da1971e90e3daa76933b3c27f0f4e8af4a5848d33da75bf6bcec8de97aa86c099bc2e91dac71cf54265c8203f420

                                  • C:\Users\Admin\AppData\Local\Temp\1000160001\Files.exe

                                    Filesize

                                    1.3MB

                                    MD5

                                    90b3832d4da1a85d18c9c515cb01780e

                                    SHA1

                                    57a70473e3046328cdce3da7943d13c1a79fe8c5

                                    SHA256

                                    ba82b9708925f266c292334bc5e20e963c6e20ce134f03f79892fd5c26e645f8

                                    SHA512

                                    3987c88a9a30a0c1b2ca03e784e3c0631f83e5576faa3243787ab2407f1fd0f9302a538e0caccc785d308802eabaf91ded96902cab70be51482513c72cd383e2

                                  • C:\Users\Admin\AppData\Local\Temp\1000193001\judit1.exe

                                    Filesize

                                    10.7MB

                                    MD5

                                    c8cf26425a6ce325035e6da8dfb16c4e

                                    SHA1

                                    31c2b3a26c05b4bf8dea8718d1df13a0c2be22ee

                                    SHA256

                                    9f7be9bf913d8378f094b3f6416db9aa4c80c380000202f7cfaddadb6efc41b4

                                    SHA512

                                    0321e48e185c22165ac6429e08afac1ccfdf393249436c8eac8a6d64794b3b399740aa5b2be23d568f57495d17e9220280ed1c2ea8f012b2c4021beb02cbc646

                                  • C:\Users\Admin\AppData\Local\Temp\1000202001\54gtxx.exe

                                    Filesize

                                    369KB

                                    MD5

                                    1b1c6f48b7c91a48a0dcd736ed0c8d24

                                    SHA1

                                    78378356bd87ca67da61826074c5737c09c197d3

                                    SHA256

                                    525a892469b4c88bf26e584ecf9a57c1f76aa9dd8e14d3a6840b73f59dbc5cf8

                                    SHA512

                                    108828525faa53156c16c03c2a7a0d87775b7575553fa408eec15692f0205fce7b9f48ff42f76095d15b15de4ec07b1d2145da440cc8237485b7ee3c06885cea

                                  • C:\Users\Admin\AppData\Local\Temp\1000240001\newstart.exe

                                    Filesize

                                    297KB

                                    MD5

                                    a20fc3377c07aa683a47397f9f5ff355

                                    SHA1

                                    13160e27dcea48dc9c5393948b7918cb2fcdd759

                                    SHA256

                                    f7891ca59e0907217db3eeafbe751e2d184317a871450b5ec401217a12df9d33

                                    SHA512

                                    dcdba7203efeea40366375fb54123b11bba972552795c64cbe912bef137698d308ea8e370732e5a65cba5687fbe6095bd53e5e1e49e3a6d8cf6912ebb61da254

                                  • C:\Users\Admin\AppData\Local\Temp\1000259001\gold.exe

                                    Filesize

                                    527KB

                                    MD5

                                    3828babaa69c01aa31609e67ac8c1f71

                                    SHA1

                                    97c9185851f81f6d9cffa22105dc858add2768f8

                                    SHA256

                                    a13c3863d0fdb36d18368500bd07167cd058d7b6fb511a9356b2cf99d14ccb48

                                    SHA512

                                    b1baf57c8a90df0142d913e83046e532161c72e894dc5aa46d3368f9e8c6d9a97067def52d07367f5a15dba84a4f6a040c3ef289a819c48d5be5653583a69234

                                  • C:\Users\Admin\AppData\Local\Temp\1000304001\acev.exe

                                    Filesize

                                    681KB

                                    MD5

                                    4f5771aa008fb55801a3f9fba7130f69

                                    SHA1

                                    eaace725791c08810198c08907b84b8850d4ef5b

                                    SHA256

                                    447ed0bdf4f8d0479545724b9578d2a3296b6bc5e2162d7ba405276234eccf0d

                                    SHA512

                                    0ce8c4c44338d92f4a5f07f38a93812a85ce5524a4ed0c4e4d616127ea6fe02e94df0938075b4d2dc3eead2fac4a827230b0d2e1333bb51146d92417b1a5bfec

                                  • C:\Users\Admin\AppData\Local\Temp\1000313001\newwork.exe

                                    Filesize

                                    416KB

                                    MD5

                                    3764897fd08b8427b978fb099c091f71

                                    SHA1

                                    a6abba0f071fbf0d4fa529b773678c6532493164

                                    SHA256

                                    a67f6fa1fa32b492f08ae46e187a143d8b107863df119cdb0759b39446827a68

                                    SHA512

                                    472730a36d32c15b4758c0c6051f27a3e72cf09e7e9d031ca923bb3d098fc7bd05e3acd00e204d41cc9c0b65ddf88cc151e9cb8e6646a73a380499c83ea4bc42

                                  • C:\Users\Admin\AppData\Local\Temp\1000339001\RobloxPlayerInstaller.exe

                                    Filesize

                                    5.6MB

                                    MD5

                                    753df56b82850430b8c7e25aaa93ea66

                                    SHA1

                                    5977fa278c4ab6f2e515efe72f09c85e67ff0590

                                    SHA256

                                    25129518eb2a72e5cee72ab1e567393abed215bb722e4db5d739b1480f1e18f2

                                    SHA512

                                    8e25374af7d513be5b2f6700dc4d07fdeea75e2fc56b32cd0ea6c5117334a02ede3cace39836df64680da92d5231d08c2f08798e9a27f2315496beda37710ac3

                                  • C:\Users\Admin\AppData\Local\Temp\1000340001\lobo.exe

                                    Filesize

                                    324KB

                                    MD5

                                    848abdbd09c052799a0e0180b59f6fee

                                    SHA1

                                    2f73b04baf17c3a9f9d21f6f324d64306a10682c

                                    SHA256

                                    1aa0622a744ec4d28a561bac60ec5e907476587efbadfde546d2b145be4b8109

                                    SHA512

                                    eb3a87e787d151915da06f89132d6e5b9b7682a3a69761795180050f42c7fbe8831049ee96410e7b7de5e7c835ceff1e24e84321cccf8d6ed9ba5928bca58203

                                  • C:\Users\Admin\AppData\Local\Temp\139.tmp\13A.tmp\13B.bat

                                    Filesize

                                    2KB

                                    MD5

                                    de9423d9c334ba3dba7dc874aa7dbc28

                                    SHA1

                                    bf38b137b8d780b3d6d62aee03c9d3f73770d638

                                    SHA256

                                    a1e1b422c40fb611a50d3f8bf34f9819f76ddb304aa2d105fb49f41f57752698

                                    SHA512

                                    63f13acd904378ad7de22053e1087d61a70341f1891ada3b671223fec8f841b42b6f1060a4b18c8bb865ee4cd071cadc7ff6bd6d549760945bf1645a1086f401

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_3284_133662636578905000\python310.dll

                                    Filesize

                                    4.3MB

                                    MD5

                                    c80b5cb43e5fe7948c3562c1fff1254e

                                    SHA1

                                    f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                    SHA256

                                    058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                    SHA512

                                    faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                  • C:\Users\Admin\AppData\Local\Temp\onefile_3284_133662636578905000\stub.exe

                                    Filesize

                                    18.0MB

                                    MD5

                                    1cf17408048317fc82265ed6a1c7893d

                                    SHA1

                                    9bfec40d6eb339c5a6c2ad6e5fa7cebc147654c5

                                    SHA256

                                    1352ad9860a42137b096d9675a7b8d578fbc596d965de3cb352619cbe6aaf4e9

                                    SHA512

                                    66322d7cb5931017acaa29970da48642d03ce35007f130511b2848b67169c1dd4167f1e5a31e5e1dfe5f7122846482bdb878b5cd695ac58009033fd620813a0f

                                  • C:\Users\Admin\AppData\RoamingFCGIJKJJKE.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    927614bdb1fff68b49468bc4a3886f36

                                    SHA1

                                    e684e796b2d93374c80e94d5b77fdd50c194a0d4

                                    SHA256

                                    30b7b1795af4fa8f43cdf9595f5a266ddfa407e9e3bab55b0684618efc6bbd0d

                                    SHA512

                                    b8c84b98902d8b9b942d8b928a65e7f23465d773f9751f64695e011717ac84257d9d736781c7e9c239ed27b481f1c7fca5a62a2ea3f255797f868e6d7a7829e7

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i7f18jmm.default-release\datareporting\glean\db\data.safe.bin

                                    Filesize

                                    9KB

                                    MD5

                                    a3a0d645875f7b3ce1056c680dd9a958

                                    SHA1

                                    7396ae01f1f75491608a43e41e42474cb82edd05

                                    SHA256

                                    9a05d7c3264f5b1500a77af2c0612434db792e43f1810da77dd656737a30d4d7

                                    SHA512

                                    ba52ac861219481c826ce7a65876c488c1d7d0cd9ce01643c93f9d7b7ac05e035ab6a7c558c74c9c1b75897a0b876e690b0f67c6dd8a31fe23b13b4265bc1460

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i7f18jmm.default-release\datareporting\glean\pending_pings\fb6b2c86-0f0f-48cb-ae20-e4ef0acf5ef9

                                    Filesize

                                    733B

                                    MD5

                                    c7bff98b696f91ea05a5fab040b4df4e

                                    SHA1

                                    a816bc1a7e2ed1d432ede5c38d4975e0b3af3b30

                                    SHA256

                                    b7ac56ff66903acdc38910a5f136aace7042d74908ea4f74cbd2f8890a07e2a5

                                    SHA512

                                    e60a95b404e8bfc19ea885439b91cc59c7a2583c3491a541fb7da007c725838c9f576eb17eb915e64bb349116a36f57bfbbdccdda0999191b503105e38763250

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i7f18jmm.default-release\prefs.js

                                    Filesize

                                    6KB

                                    MD5

                                    98e0b86d55ed34226faa01b02b2551ae

                                    SHA1

                                    465317ecfe5ee552be4881cc3f1882370fa870b0

                                    SHA256

                                    948f8aef0a1f12c050f05f86660dec4f93a5ebb4a4bbfff80adf2cdeb52bf4a9

                                    SHA512

                                    2b886c67e4521903191b235837f079a14bb53c0ff46f6d6449c10191a86f4d363ba0bddea2e9ca0bf6f762676392f11a5b2b948abe74e798ac3e4485d61c1919

                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\i7f18jmm.default-release\sessionstore-backups\recovery.jsonlz4

                                    Filesize

                                    4KB

                                    MD5

                                    e5358ef03ead1c85f007b57391ec30ef

                                    SHA1

                                    a15b47629e8aecc6877489631c3deba85bb4d0a1

                                    SHA256

                                    88f3a95aa120b48d8d205bb62e0760ca15762ba63654a2f64883ef3cee591088

                                    SHA512

                                    e6770703d3e2bfadb0fe32801800dc4754eb082184e4ba1a4665ee319ee4a6afae9e8db023c43dc28e0e59b5378d638e4afee2e089ebad85d8961bc72dba5909

                                  • \ProgramData\mozglue.dll

                                    Filesize

                                    593KB

                                    MD5

                                    c8fd9be83bc728cc04beffafc2907fe9

                                    SHA1

                                    95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                    SHA256

                                    ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                    SHA512

                                    fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                  • \ProgramData\nss3.dll

                                    Filesize

                                    2.0MB

                                    MD5

                                    1cc453cdf74f31e4d913ff9c10acdde2

                                    SHA1

                                    6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                    SHA256

                                    ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                    SHA512

                                    dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                  • \Users\AdminCFHCGHJDBF.exe

                                    Filesize

                                    1.8MB

                                    MD5

                                    55ae6824de0605286604f8d0c6ff3bd5

                                    SHA1

                                    1b6f28e679c355f962c68b24c2484789c4901bab

                                    SHA256

                                    64c52a4196e60248c988f755fdae2e752c96554b043a6d1a3d98980c25b8a2e2

                                    SHA512

                                    4a633b8740ebc657c753389b6378d21d93d8e19aaba9d72df6207698a1a41c09436ba55ff2f05a873e490554af7d2fb3a54b076878ed1c70e4371af609a6e77c

                                  • \Users\Admin\AppData\Roaming\d3d9.dll

                                    Filesize

                                    649KB

                                    MD5

                                    103c525aa49b81407e72a346baa3ec19

                                    SHA1

                                    1ae74f6ef71b929472d28d064fc0c17d0fc54d1c

                                    SHA256

                                    0593eef89f1bde96f5d469281de905717e9b38a70d9b374c9c3193fcb740a22d

                                    SHA512

                                    4fb74f42fce676b37208b75ce378f4b91772f4c088a7c3c8d120f92c67d337dad99e21f26da5adaff0a2566158ec33de35e8341415a1f6a729d5840cee69ef8b

                                  • memory/1628-79-0x0000000000A50000-0x0000000000F06000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1628-129-0x0000000000A50000-0x0000000000F06000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1628-68-0x0000000000A50000-0x0000000000F06000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1628-77-0x0000000000A51000-0x0000000000A7F000-memory.dmp

                                    Filesize

                                    184KB

                                  • memory/1628-149-0x0000000000A50000-0x0000000000F06000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1628-151-0x0000000006E20000-0x00000000072D6000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1628-72-0x0000000077450000-0x0000000077452000-memory.dmp

                                    Filesize

                                    8KB

                                  • memory/1716-633-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-667-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-660-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-677-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-152-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-675-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-665-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-295-0x000000000A090000-0x000000000A546000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-407-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-408-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-414-0x000000000A090000-0x000000000A546000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-669-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-673-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-509-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/1716-671-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/2288-548-0x0000000000DC0000-0x0000000000E70000-memory.dmp

                                    Filesize

                                    704KB

                                  • memory/2288-549-0x00000000004C0000-0x00000000004C6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/2504-664-0x0000000000430000-0x0000000000438000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/2504-662-0x00000000000C0000-0x00000000000C8000-memory.dmp

                                    Filesize

                                    32KB

                                  • memory/2644-555-0x000000013F540000-0x000000014077E000-memory.dmp

                                    Filesize

                                    18.2MB

                                  • memory/2792-2-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                                    Filesize

                                    972KB

                                  • memory/2792-150-0x0000000000D50000-0x0000000001328000-memory.dmp

                                    Filesize

                                    5.8MB

                                  • memory/2792-67-0x0000000000D50000-0x0000000001328000-memory.dmp

                                    Filesize

                                    5.8MB

                                  • memory/2792-0-0x0000000000D50000-0x0000000001328000-memory.dmp

                                    Filesize

                                    5.8MB

                                  • memory/2792-309-0x0000000000D50000-0x0000000001328000-memory.dmp

                                    Filesize

                                    5.8MB

                                  • memory/3156-289-0x0000000000370000-0x000000000083A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3156-446-0x0000000006FF0000-0x00000000074BA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3156-322-0x0000000000370000-0x000000000083A000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3156-323-0x0000000006FF0000-0x00000000074BA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3284-554-0x000000013F350000-0x000000013FE28000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3284-590-0x000000013F350000-0x000000013FE28000-memory.dmp

                                    Filesize

                                    10.8MB

                                  • memory/3776-508-0x0000000000CA0000-0x0000000000CF0000-memory.dmp

                                    Filesize

                                    320KB

                                  • memory/3804-330-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-332-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-293-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-331-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3804-335-0x0000000000E70000-0x0000000001326000-memory.dmp

                                    Filesize

                                    4.7MB

                                  • memory/3804-327-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-310-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-325-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3804-334-0x0000000000400000-0x0000000000643000-memory.dmp

                                    Filesize

                                    2.3MB

                                  • memory/3948-634-0x0000000000400000-0x000000000245B000-memory.dmp

                                    Filesize

                                    32.4MB

                                  • memory/3980-666-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-672-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-678-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-668-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-661-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-670-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-442-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-324-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-635-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-674-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-450-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-676-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/3980-533-0x0000000000F30000-0x00000000013FA000-memory.dmp

                                    Filesize

                                    4.8MB

                                  • memory/4068-406-0x0000000000400000-0x000000000245F000-memory.dmp

                                    Filesize

                                    32.4MB