Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 16:11

General

  • Target

    file.exe

  • Size

    1.8MB

  • MD5

    9ddbac8aaba1c5bb2f9a22717a60a6ba

  • SHA1

    16712810fcf1bb9c7f1940af8e2e59b92f4a7b65

  • SHA256

    edec375a0ef3ce9e3067aa661e9e32fee7cba13ff4f3c7ab69d6db8d7b22b03d

  • SHA512

    05d112dad0d496f825ed88c18d7c196432994f5ccca9f6f1e098d6376d56c1aa98d8c47e9542acfe2a53672802e89e68257f607b843e4ebdbd38cd44f1ddbddd

  • SSDEEP

    49152://TTxdTbrxgYihAr5xkWqG8E/N3SEry5RUuzen3lBsVL9t:/7TxZb0qrd9ucB8

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

mars

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Detects CryptBot payload 1 IoCs

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Uses browser remote debugging 2 TTPs 4 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 30 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Checks computer location settings
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe
        "C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\1008231001\cfbeacdd77.exe
        "C:\Users\Admin\AppData\Local\Temp\1008231001\cfbeacdd77.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Checks computer location settings
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        PID:4572
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"
          4⤵
          • Uses browser remote debugging
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:5888
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc7c3ecc40,0x7ffc7c3ecc4c,0x7ffc7c3ecc58
            5⤵
              PID:5928
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2264,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2256 /prefetch:2
              5⤵
                PID:5152
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1716,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1600 /prefetch:3
                5⤵
                  PID:5160
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1836,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:8
                  5⤵
                    PID:5168
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5480
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5492
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4492,i,14098458017284165236,17241560821348455101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:1
                    5⤵
                    • Uses browser remote debugging
                    PID:5872
                • C:\Users\Admin\AppData\Local\Temp\service123.exe
                  "C:\Users\Admin\AppData\Local\Temp\service123.exe"
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:5172
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:6104
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 1308
                  4⤵
                  • Program crash
                  PID:216
              • C:\Users\Admin\AppData\Local\Temp\1008232001\be45d9aa86.exe
                "C:\Users\Admin\AppData\Local\Temp\1008232001\be45d9aa86.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:676
              • C:\Users\Admin\AppData\Local\Temp\1008233001\9dae0f0c10.exe
                "C:\Users\Admin\AppData\Local\Temp\1008233001\9dae0f0c10.exe"
                3⤵
                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                • Checks BIOS information in registry
                • Executes dropped EXE
                • Identifies Wine through registry keys
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:1744
              • C:\Users\Admin\AppData\Local\Temp\1008234001\c86fef49a8.exe
                "C:\Users\Admin\AppData\Local\Temp\1008234001\c86fef49a8.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:4236
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM firefox.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3904
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM chrome.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1368
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM msedge.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3608
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM opera.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1228
                • C:\Windows\SysWOW64\taskkill.exe
                  taskkill /F /IM brave.exe /T
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Kills process with taskkill
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4996
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                  4⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3628
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                    5⤵
                    • Checks processor information in registry
                    • Modifies registry class
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:4816
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {96dd435f-10a8-4ea2-8961-12f716025ad3} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" gpu
                      6⤵
                        PID:1588
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2376 -prefMapHandle 2384 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {967491af-3935-4b41-8e16-f056b74fa4a1} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" socket
                        6⤵
                          PID:2180
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1520 -childID 1 -isForBrowser -prefsHandle 3008 -prefMapHandle 3028 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa50727c-be0e-4946-8c95-9e6a3df8e1ca} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab
                          6⤵
                            PID:1256
                          • C:\Program Files\Mozilla Firefox\firefox.exe
                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2820 -childID 2 -isForBrowser -prefsHandle 4028 -prefMapHandle 4024 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2adff78-0105-42e2-881f-e055fb91a671} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab
                            6⤵
                              PID:1960
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4752 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4744 -prefMapHandle 4724 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80a1f457-c9ed-412e-921b-16bf0b77da72} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" utility
                              6⤵
                              • Checks processor information in registry
                              PID:5392
                            • C:\Program Files\Mozilla Firefox\firefox.exe
                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5032 -childID 3 -isForBrowser -prefsHandle 5156 -prefMapHandle 4220 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47f28ebb-8149-475b-96cb-c3a52fa7d0f3} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab
                              6⤵
                                PID:6048
                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 5304 -prefMapHandle 5280 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5caef0d-ef9b-4b8c-92ca-cba992f93b2a} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab
                                6⤵
                                  PID:6064
                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5592 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1072 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ffe30559-5b23-4353-ad93-b150e3f10b41} 4816 "\\.\pipe\gecko-crash-server-pipe.4816" tab
                                  6⤵
                                    PID:6076
                            • C:\Users\Admin\AppData\Local\Temp\1008235001\6bea22af89.exe
                              "C:\Users\Admin\AppData\Local\Temp\1008235001\6bea22af89.exe"
                              3⤵
                              • Modifies Windows Defender Real-time Protection settings
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Windows security modification
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2356
                        • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                          1⤵
                            PID:5864
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4572 -ip 4572
                            1⤵
                              PID:1136
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:6132
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:4948
                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                              1⤵
                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                              • Checks BIOS information in registry
                              • Executes dropped EXE
                              • Identifies Wine through registry keys
                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4940
                            • C:\Users\Admin\AppData\Local\Temp\service123.exe
                              C:\Users\Admin\AppData\Local\Temp\/service123.exe
                              1⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:1112

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                              Filesize

                              2B

                              MD5

                              d751713988987e9331980363e24189ce

                              SHA1

                              97d170e1550eee4afc0af065b78cda302a97674c

                              SHA256

                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                              SHA512

                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json

                              Filesize

                              23KB

                              MD5

                              9c5bf5648b974b544864d3dfa824fd62

                              SHA1

                              eec1c2aa7ce0c2815ee936ed88ad6f8d7fa83f22

                              SHA256

                              491d9b7374e82cb50ab1aa1f6e3de707cd3bb6a6e4b334756b6d10cea05d5452

                              SHA512

                              0da94fe0b694e0f11b4169e5bffbc8b785eb4e468bf6a73c9fc9b42e0e88e009b1ceeb2c4afce9c790ec502df9be5656a07ef4382f798c4b60f9fac14e883203

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878

                              Filesize

                              13KB

                              MD5

                              2e9e9f8e72300fb14befba08b518bc95

                              SHA1

                              a2029318b8c6147effb627fabd623005f7957aee

                              SHA256

                              d31bfc40788dff4e1e71dffb1719f9fdd4f78c96eb847aa2d8168100c2cdb504

                              SHA512

                              1f487a8855b0dcc491525b3acb8651e83c48bc776aaf86da53b163c4d2e9efa855357f98b3b2b1b89d600a2a8c0d5c8548475c43472501911ef4da37d311913a

                            • C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe

                              Filesize

                              1.8MB

                              MD5

                              2f1f5a83cde7780e78bf374eff93dfb8

                              SHA1

                              0f15632195b9193e78dbbc4f5eac3d767ff5e26a

                              SHA256

                              5058ba217aa198969ab25e11959ec8c7aaa544674903b6ae674f54e73b77b0b9

                              SHA512

                              d7af239e2bfcf64c8f3e5955be8bdd129a2c5f49aefcdc501e362a2de817c357417c5b2c9aeb47a4e22d4f0793b52a8b0d0b25806b08bf48414b718bf8a88b3c

                            • C:\Users\Admin\AppData\Local\Temp\1008231001\cfbeacdd77.exe

                              Filesize

                              4.2MB

                              MD5

                              0dabff043e7ec45a107a3dd50ed20aeb

                              SHA1

                              58ee3becedf826ea02c7d3ef5048f62b3ced3c66

                              SHA256

                              e0e0f020cdeef9cf0cb33b23d4fdcb7b74bdfda03a1916e7e79c40d71d0f1e51

                              SHA512

                              a8c6c913af8f03fcd9c1a5a6379d257e98516072f10d483768c787153fa60b1a1be268bd9f00c1957488c3c36cc0db50de22848de30cdee97a9ea90af2401a56

                            • C:\Users\Admin\AppData\Local\Temp\1008232001\be45d9aa86.exe

                              Filesize

                              1.8MB

                              MD5

                              6d4e1d2500dc2733f8f3ceb2815df08b

                              SHA1

                              4fd3d112e5fcbcf6862d72df4cf071a7bae9d0b7

                              SHA256

                              48cc3a2b111fcdcd5e1fa49d3f80881b41a02840bc67d297dd6dc8228d9b1e0a

                              SHA512

                              c92628410b1198608cc1da28177dd68f56cf1140b33dae4439e7fa58ada9de9f2913e76052f720c1ce20b31f5602438cb5bad74b3ff8e63d1892ec2e5b8b9f65

                            • C:\Users\Admin\AppData\Local\Temp\1008233001\9dae0f0c10.exe

                              Filesize

                              1.7MB

                              MD5

                              c80d723528ed0121eef557cc31bd4c87

                              SHA1

                              150ec423edbfb73989a525fc3b553d06f411ece7

                              SHA256

                              fa8380534c7876773e1315360225f92d30fc4ff6c4cdf70bebaf16e5f450d6f5

                              SHA512

                              3ae11b656d242e891881b5833781a1431d0dde16de66a21b775613a7d02e098a68ad41301fa85f5cf3bd0bb7561c1ab784fd0d3c4940a45d66aa67f10b475da8

                            • C:\Users\Admin\AppData\Local\Temp\1008234001\c86fef49a8.exe

                              Filesize

                              901KB

                              MD5

                              c72402184ff4b1d75d9893d6b2bc6be4

                              SHA1

                              6b84b9f3c7fcb0d17ec9327b6d59ab8b9ac2522b

                              SHA256

                              edb36a19aaa5ff001641a1a8daa7e430511a82ebd0d22d72a26c4311299d5bf9

                              SHA512

                              2e3f72ea7da591fabf7e3b3fb30e8455bbfdbb5156274383cde3ca1769bc0625a1838e13f33d2cb0a05e7ee9faa5adc31180e1898ebf8d7d5e1613093a970948

                            • C:\Users\Admin\AppData\Local\Temp\1008235001\6bea22af89.exe

                              Filesize

                              2.7MB

                              MD5

                              9cb310eaaba4f310d47c1b4d401c06b2

                              SHA1

                              e1fd02abe8f284002f1287b223cf713c1bf18044

                              SHA256

                              e15196f67a2f619908439e73fc2972850234696b0a0eaa84291dc788ebb70cbd

                              SHA512

                              583f3f0374c2705eb411b0738e299b5a305508511fddb70868daa953089eb283149d4ff0dfd63ac53b0d513e6623e095881af34945271e1ed3b5b9f293950f52

                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                              Filesize

                              1.8MB

                              MD5

                              9ddbac8aaba1c5bb2f9a22717a60a6ba

                              SHA1

                              16712810fcf1bb9c7f1940af8e2e59b92f4a7b65

                              SHA256

                              edec375a0ef3ce9e3067aa661e9e32fee7cba13ff4f3c7ab69d6db8d7b22b03d

                              SHA512

                              05d112dad0d496f825ed88c18d7c196432994f5ccca9f6f1e098d6376d56c1aa98d8c47e9542acfe2a53672802e89e68257f607b843e4ebdbd38cd44f1ddbddd

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              ab9d5adc8e57d81a246ae0ffd894c3c3

                              SHA1

                              ba85035a476014dcef19d2e0618a6e715696d443

                              SHA256

                              6d45cf591f82185500b0adcd8bb950fe4cbc771ae0d149aab13c061e2592343a

                              SHA512

                              73aebab7f7763d9a4842f36097b6a8b6fc08fe4cb7e7bc3b51d83084510ef59b82b7fcd8933b8b235294b58220e73cc836d16cc2330e64e7d49dbc5389bd8693

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin

                              Filesize

                              13KB

                              MD5

                              b417fb33c8a147c854b497f6dbe92029

                              SHA1

                              101dcdea5d8f53058a7ae4e790ed221c2764f38d

                              SHA256

                              ea10a5b411d7ac9a11cce071571d7d9eb8b18e6da4c281709dde1a5dd4303a02

                              SHA512

                              e0e4c1cb28f27d3fbce872e37b4b1d9a5b8d2915e412d379fee4e3a818c67a4d24a6984bd4f8df85c0ccc88d332b364b26fa89036357ac4884755e5f807d69af

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              0b8070b0783019197683979a616f2746

                              SHA1

                              cc57e68f953b30d1d063dad0d8c91e92fa58db50

                              SHA256

                              7b24ad20214a129a44c98e8896bf7acd570430b36c69123fe8c202f3e45da0c0

                              SHA512

                              2faaf449ba49a22a6d7a06782d20a5bf710978645f1081b97c9d897a6fa32957b14edb559388f60b01c65d21951d7d699361520b730055d83e6538bc0663e32f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              12e57b0018c22f0a2fbde478d9c257ce

                              SHA1

                              1d7593436c240e9b0274927831d5aaa96db57718

                              SHA256

                              1b00d21451f4788b8735e8e9c912785ae91991866747240a4d51116e7f1ab6e9

                              SHA512

                              75fa2c4338ebbc6ec0cc63a69123829d8ec3d621bdb543a927a8758d8ae22a8abe61ed2f7a5aa1363df5532c8932b3cb7aa2710e324ef95dd5a1dd428487c22a

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              15KB

                              MD5

                              d41969eec04ea2bb1744846ab7df2514

                              SHA1

                              fd55350079ee1bda7e26eec3165b309b906375b9

                              SHA256

                              bfa3cc526d941a89104f8e4d566b8abd0c8be2c7a04d99d82b7df355ab51a6cc

                              SHA512

                              21a8a3eb7130160de9502fc5f6662b25d1765d98aa6aa18607be03fde60e35207f8fe5bccdf74ecddfe158a23d6f9db78ada039ff99ec6e30cf627871b80feb8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              5fd2224d2ab16c8a9423fa9936e743c2

                              SHA1

                              a0e0d54dbed8621e8941b61c3beddfce3ab1f590

                              SHA256

                              c3ead1d752cfde57a23eb575fec6e5a14c5247e2b7edee11e71a793c758659f0

                              SHA512

                              bb2daeb2b78ccf706d3bf913e0435425999b348e6cfe2685ebd914657aba9a88cd47c78ba567fd97272306aec789361c2b6ecb58378a8ad7724dd2acaca81c1d

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\5f4b35d4-0489-4274-af5c-8e106dc3f78c

                              Filesize

                              24KB

                              MD5

                              24a6792962c0049f64e086a5981fcd9f

                              SHA1

                              55bf8855c424d14fcb8abf04662da4e6a122cb95

                              SHA256

                              b2caf1f81a1185b3bb976a3f7c7bfea4e27945aa625eb436129780ca5fca2249

                              SHA512

                              6ec754eb155cfe9f09340b6f4e0f1f158454559be6de7e2b9dd829d01217c43981e3ce2850f28488d2ba89cf3fdbf3814a0fd3bf6bb6256816264ad029a98427

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\627c4153-63b0-4496-8399-3ab10945ff58

                              Filesize

                              671B

                              MD5

                              5d262e0ff5b3c33793490b5d275b3fcf

                              SHA1

                              b3c1fe5feeb931bb260023a34d56e5b6e853be96

                              SHA256

                              b0b8f6d9db03166835eaefa3526615714c2a10403e3bcd10084660d0c6682da5

                              SHA512

                              ab0c043d5338330722dc4de33aca6e62d00da32015f57410632da3a7b7e1f7c14e72acedbbbe61dfc719301109e770d77d8e745a82a78f68c74dcc4ebab28e47

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\70f17104-268c-469a-b54b-7e9b7f50549f

                              Filesize

                              982B

                              MD5

                              40d3b12a341f47bc8f45007ee9f831cf

                              SHA1

                              8d7dd44c321584603a4a81ac1207f282113621a7

                              SHA256

                              37d1d9c4e9566e73c6df75544212f35824e4d07a5dddf2161bca95227bf54531

                              SHA512

                              9f70d877338fc8da7c42463281f289c4e5039fcd6b4bb6131147acf1da0b2c9781811194d80460888528be43be8bb50bf153af9d9c3b171c13deb6f093d3a91b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                              Filesize

                              11KB

                              MD5

                              034c52f811be8e2845f462c076b53bea

                              SHA1

                              4bd880386998740424df1b2218eb7f06e701aab3

                              SHA256

                              0fef4111a55ccdd2fa25a19194833c29c8cb264969ff9016bea289a7bcf28c27

                              SHA512

                              1b09934de6ec5b99f88db75dfafd60eee78dd876eda717e2d75982f3708c31c9ef5667e56971903ed7179a65c7840b69166ebbc660012b4d94b4526856311127

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              211448cbee2d7e5aba44398047440e48

                              SHA1

                              86e43af1a7e92dc36f78bdd1cfb7857876e6e5a0

                              SHA256

                              aa748a0f722369f2c96f43d8c896e8fb32cc01a2ecba7324b286e14f0585adea

                              SHA512

                              dd8fe3ef678a0903b73a55f5d2e4f13f968490b83c1da6640a3303fa58494213e4101e0afe375c6d1096a95be3987d161ac5abc43ae3ecac5abf8d140332dec5

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs-1.js

                              Filesize

                              15KB

                              MD5

                              dfc1e995386392b1c2ed37b7323ff77c

                              SHA1

                              e4f92d23076a73a735e67b404030da8a0a444683

                              SHA256

                              5542fb5d37a7e7ef0339c6f0b00dd32ac3c1931360224458436284b73480804c

                              SHA512

                              08fa50c815d2f677d847b343625fceb9f214a1a4706072fd4933c74c7d98aa2e0542a9328ed1a30712fd28d6784af3c16147f11ebe7de4389a4000cb1bf878c9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\prefs.js

                              Filesize

                              11KB

                              MD5

                              43e8ac58c9a859cccdff72f5129bd5d8

                              SHA1

                              5b6600b3e5f01d1010b503364de0221e28440999

                              SHA256

                              68d0c4e873cf5e050f0da82901bcf958d8c00effa5c7adaaf5f5cbfd75390701

                              SHA512

                              e878044ab2989c6e0339cf486af7a9fe3e5e0ec513f569366e297d147fe70add53e7dab93f09a06dfec41ca7ea6cdf7775c90620a49ef088329ba208927d38c9

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              800KB

                              MD5

                              99fb590caea1d2fdc5d846c025c89685

                              SHA1

                              5e54d2da6919869d167a5a09fd791cbd706aa04a

                              SHA256

                              4328f9f75af17fc1531fd863f16d9beb5570639cf5136ab0d79d1a3d329d5894

                              SHA512

                              146be9e5acc84fce960cf6374f3e303ac4881a30709c06515db551749f35a3a54002dcec01cd2d9572c97a2ba174937ae1d7c8873158bcaacb96ed44b5c1e4e7

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                              Filesize

                              3.0MB

                              MD5

                              46b8e27454296c920c91aa8556c51618

                              SHA1

                              67653ab5874217ca4a5d4138a21c1fe134beb588

                              SHA256

                              3f8294b6807ca850104a0ca51d5dc8d549e1f407baf5654e2b5aa4a173f5a433

                              SHA512

                              804afe7889893901b5f28f698f0eb3763fddfde3332d6da5b6a1f0cbc680c6c3e4af4b3e9cf74708119bb5a66edea3826a974ce849032a9dd25d3f9453304d94

                            • memory/676-75-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-2945-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-123-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-1157-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-2288-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-584-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-2927-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-2934-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-565-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-133-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/676-2941-0x0000000000580000-0x0000000000A14000-memory.dmp

                              Filesize

                              4.6MB

                            • memory/1112-2953-0x0000000000410000-0x0000000000422000-memory.dmp

                              Filesize

                              72KB

                            • memory/1172-43-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-38-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2948-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2944-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-17-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2964-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-552-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2939-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2958-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-1704-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2930-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-578-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-737-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-102-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2698-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-41-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-2961-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-29-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-20-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-19-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/1172-18-0x0000000000B61000-0x0000000000B8F000-memory.dmp

                              Filesize

                              184KB

                            • memory/1744-101-0x0000000000ED0000-0x0000000001558000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/1744-100-0x0000000000ED0000-0x0000000001558000-memory.dmp

                              Filesize

                              6.5MB

                            • memory/2228-1-0x0000000077754000-0x0000000077756000-memory.dmp

                              Filesize

                              8KB

                            • memory/2228-0-0x0000000000800000-0x0000000000CC7000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2228-16-0x0000000000800000-0x0000000000CC7000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2228-2-0x0000000000801000-0x000000000082F000-memory.dmp

                              Filesize

                              184KB

                            • memory/2228-5-0x0000000000800000-0x0000000000CC7000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2228-3-0x0000000000800000-0x0000000000CC7000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/2356-551-0x00000000009B0000-0x0000000000C6A000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2356-576-0x00000000009B0000-0x0000000000C6A000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2356-509-0x00000000009B0000-0x0000000000C6A000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2356-550-0x00000000009B0000-0x0000000000C6A000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2356-573-0x00000000009B0000-0x0000000000C6A000-memory.dmp

                              Filesize

                              2.7MB

                            • memory/2984-42-0x00000000005A0000-0x0000000000A4A000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2984-39-0x00000000005A1000-0x00000000005C8000-memory.dmp

                              Filesize

                              156KB

                            • memory/2984-37-0x00000000005A0000-0x0000000000A4A000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/2984-40-0x00000000005A0000-0x0000000000A4A000-memory.dmp

                              Filesize

                              4.7MB

                            • memory/4572-59-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-745-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-104-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-563-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-103-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-579-0x0000000000A00000-0x0000000001646000-memory.dmp

                              Filesize

                              12.3MB

                            • memory/4572-76-0x0000000069CC0000-0x000000006A71B000-memory.dmp

                              Filesize

                              10.4MB

                            • memory/4940-2955-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4940-2950-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/4948-853-0x0000000000410000-0x0000000000422000-memory.dmp

                              Filesize

                              72KB

                            • memory/5172-1499-0x0000000073640000-0x0000000073774000-memory.dmp

                              Filesize

                              1.2MB

                            • memory/5172-1498-0x0000000000410000-0x0000000000422000-memory.dmp

                              Filesize

                              72KB

                            • memory/6132-780-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB

                            • memory/6132-771-0x0000000000B60000-0x0000000001027000-memory.dmp

                              Filesize

                              4.8MB