Resubmissions

04-12-2024 19:24

241204-x4fqgsspcn 10

04-12-2024 19:06

241204-xr4a1swncx 6

04-12-2024 19:03

241204-xqb55s1req 3

04-12-2024 19:00

241204-xnnq6awlhx 6

04-12-2024 18:20

241204-wy7fksvkdt 7

04-12-2024 17:37

241204-v67kwasrgs 3

Analysis

  • max time kernel
    882s
  • max time network
    883s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 19:24

Errors

Reason
Machine shutdown

General

  • Target

    sample.html

  • Size

    19KB

  • MD5

    dcb9d87a83da8972f5cee58389fd1805

  • SHA1

    04288b3a9f36616088c0111bea2473c8a32a9756

  • SHA256

    2ea93fd81425d720cdfcbcccfcc878f16f5e870139e14b851d149679ec82375a

  • SHA512

    2e5cc2973b00f2d9688c4cd051c3b40073828b5e65fbb4cf24f0123a2c262c5bc09e8383d4a27fafd4acc96c380d9b7c646176d4d92c77f337065dd69acbeab3

  • SSDEEP

    384:X6CdeU1ocy4K4lbGaIBvhpNC9CKVlObz6r0sZZfk1xCejiw:XVdZ1ocy4xEaAJpNCCVbz6r0sZBexPiw

Malware Config

Extracted

Family

danabot

C2

51.178.195.151

51.222.39.81

149.255.35.125

38.68.50.179

51.77.7.204

rsa_pubkey.plain

Signatures

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot family
  • Danabot x86 payload 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Floxif family
  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Detects Floxif payload 1 IoCs
  • Blocklisted process makes network request 8 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 30 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0a8746f8,0x7ffc0a874708,0x7ffc0a874718
      2⤵
        PID:1064
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:4864
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4992
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
          2⤵
            PID:856
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:1
            2⤵
              PID:2788
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2428 /prefetch:1
              2⤵
                PID:2424
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:8
                2⤵
                  PID:4020
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5008 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:5116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:1
                  2⤵
                    PID:3484
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                    2⤵
                      PID:1588
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1
                      2⤵
                        PID:4340
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:1
                        2⤵
                          PID:4512
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:1
                          2⤵
                            PID:4152
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:1
                            2⤵
                              PID:1112
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:1
                              2⤵
                                PID:2020
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:1
                                2⤵
                                  PID:2096
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6052 /prefetch:1
                                  2⤵
                                    PID:1652
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6816 /prefetch:8
                                    2⤵
                                      PID:3100
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6904 /prefetch:1
                                      2⤵
                                        PID:4408
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5496 /prefetch:2
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:752
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2240,8643371595112829017,14042148122191405642,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5880 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2868
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:5088
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:2964
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:2016
                                          • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe
                                            "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Banking-Malware\DanaBot.exe"
                                            1⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1176
                                            • C:\Windows\SysWOW64\regsvr32.exe
                                              C:\Windows\system32\regsvr32.exe -s C:\Users\Admin\DOWNLO~1\THE-MA~1\THE-MA~1\BANKIN~1\DanaBot.dll f1 C:\Users\Admin\DOWNLO~1\THE-MA~1\THE-MA~1\BANKIN~1\DanaBot.exe@1176
                                              2⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:3880
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                C:\Windows\SysWOW64\rundll32.exe C:\Users\Admin\DOWNLO~1\THE-MA~1\THE-MA~1\BANKIN~1\DanaBot.dll,f0
                                                3⤵
                                                • Blocklisted process makes network request
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                PID:2232
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 968
                                                  4⤵
                                                  • Program crash
                                                  PID:3876
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1176 -s 488
                                              2⤵
                                              • Program crash
                                              PID:4580
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1176 -ip 1176
                                            1⤵
                                              PID:3180
                                            • C:\Windows\system32\OpenWith.exe
                                              C:\Windows\system32\OpenWith.exe -Embedding
                                              1⤵
                                              • Modifies registry class
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3276
                                            • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe
                                              "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe"
                                              1⤵
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:2136
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 432
                                                2⤵
                                                • Program crash
                                                PID:3576
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2136 -ip 2136
                                              1⤵
                                                PID:4588
                                              • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe
                                                "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Floxif\Floxif.exe"
                                                1⤵
                                                • Loads dropped DLL
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4076
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 400
                                                  2⤵
                                                  • Program crash
                                                  PID:2172
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4076 -ip 4076
                                                1⤵
                                                  PID:4740
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Gnil\Gnil.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Gnil\Gnil.exe"
                                                  1⤵
                                                  • Drops file in Drivers directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5052
                                                  • C:\Windows\SysWOW64\drivers\spoclsv.exe
                                                    C:\Windows\system32\drivers\spoclsv.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:1568
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe"
                                                  1⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3356
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpaj.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpaj.exe"
                                                  1⤵
                                                  • Writes to the Master Boot Record (MBR)
                                                  • Drops file in Program Files directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1764
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpajB.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Xpaj\xpajB.exe"
                                                  1⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                  PID:2964
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\7ev3n.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\7ev3n.exe"
                                                  1⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:392
                                                  • C:\Users\Admin\AppData\Local\system.exe
                                                    "C:\Users\Admin\AppData\Local\system.exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2676
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3420
                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                      C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:3172
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1952
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                        4⤵
                                                        • Modifies WinLogon for persistence
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3464
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3556
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                        4⤵
                                                        • Adds Run key to start application
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2904
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3532
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1944
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1696
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4844
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2152
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:656
                                                    • C:\windows\SysWOW64\cmd.exe
                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1384
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                        4⤵
                                                        • UAC bypass
                                                        • System Location Discovery: System Language Discovery
                                                        PID:632
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:692
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5092
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2724
                                                      • C:\Windows\SysWOW64\shutdown.exe
                                                        shutdown -r -t 10 -f
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2736
                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\$uckyLocker.exe
                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Ransomware\$uckyLocker.exe"
                                                  1⤵
                                                  • Sets desktop wallpaper using registry
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4956
                                                • C:\Windows\system32\LogonUI.exe
                                                  "LogonUI.exe" /flags:0x4 /state0:0xa3974055 /state1:0x41c64e6d
                                                  1⤵
                                                  • Modifies data under HKEY_USERS
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1012
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2232 -ip 2232
                                                  1⤵
                                                    PID:1596

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Program Files\Common Files\System\symsrv.dll

                                                    Filesize

                                                    72KB

                                                    MD5

                                                    ccf7e487353602c57e2e743d047aca36

                                                    SHA1

                                                    99f66919152d67a882685a41b7130af5f7703888

                                                    SHA256

                                                    eaf76e5f1a438478ecf7b678744da34e9d9e5038b128f0c595672ee1dbbfd914

                                                    SHA512

                                                    dde0366658082b142faa6487245bfc8b8942605f0ede65d12f8c368ff3673ca18e416a4bf132c4bee5be43e94aef0531be2008746c24f1e6b2f294a63ab1486c

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    56a4f78e21616a6e19da57228569489b

                                                    SHA1

                                                    21bfabbfc294d5f2aa1da825c5590d760483bc76

                                                    SHA256

                                                    d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb

                                                    SHA512

                                                    c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                    Filesize

                                                    152B

                                                    MD5

                                                    e443ee4336fcf13c698b8ab5f3c173d0

                                                    SHA1

                                                    9bf70b16f03820cbe3158e1f1396b07b8ac9d75a

                                                    SHA256

                                                    79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b

                                                    SHA512

                                                    cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                    Filesize

                                                    3KB

                                                    MD5

                                                    f70d042839c6cddb63632d8e72694cf2

                                                    SHA1

                                                    66c34c1ae295948ce92ec98abd1fdb3552176ed2

                                                    SHA256

                                                    934bf7523acbefb36889b73919ec314834aa224469b852ef507768b767672a1f

                                                    SHA512

                                                    d4f576b85b0d4737b98686b6e0d1cbe36f811d86a0523390674269b8aab1fec2be2ed71f63e71c1d885c974a19587ed2686888b8f5a61f3b29d243a313cb135f

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    934B

                                                    MD5

                                                    b7de0e1548771aa278a251c705523f8d

                                                    SHA1

                                                    cdaeca9e9df28fb61815384e487e6e8627037fc5

                                                    SHA256

                                                    d95cd81ebc54e7f4cb16229e9ba9e74caa509412f062558836976ee76336c0bb

                                                    SHA512

                                                    0eb3bb9da7f32bf8846a98018ef43390414b83cdd5d4000533b0f87f9e57570d1896091848063ad5bf25cbf7fb51b9e9b18d711ca8be25b082cf811307b1f394

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                    Filesize

                                                    111B

                                                    MD5

                                                    285252a2f6327d41eab203dc2f402c67

                                                    SHA1

                                                    acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                    SHA256

                                                    5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                    SHA512

                                                    11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    46f7b4caecc6642ffc98062a8167398b

                                                    SHA1

                                                    d58631d511444b21e9f6e75f8eaa94b035f7b5fd

                                                    SHA256

                                                    c9d0db9778204756a03f995ddf59292972e1f78e3d210e8f4d41a9c290dd8653

                                                    SHA512

                                                    f1d93b8c74953e7301c3bf9c56530124d82ad27a190b8db726adf84ea4cb1c62e1d990f08c136eacdbf6892bd122a299ba6ca953822f31ebf053d987aa270612

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    7KB

                                                    MD5

                                                    e81382584173e6e7b0d62ca03e684c4e

                                                    SHA1

                                                    38ae67e2f706c9d365abcf943a8a5d5fcb8e19f7

                                                    SHA256

                                                    6101415f02a8d986a3e79e64ad9846170b59bd2c392ba71a03ba3934ac1b8bd9

                                                    SHA512

                                                    59e88a2af8edf6cad97f1c28bd8f2a6b449fff9673308623b53256a47cf51eec49e053a1fe391a1e6170e3f3bae07e056d8c42102c9c13b6fd43458bb26779dc

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    5KB

                                                    MD5

                                                    3be071074abff8f18bc603b5345571e0

                                                    SHA1

                                                    5526f3f4c5024d1544528aa49c836d9bc2b41654

                                                    SHA256

                                                    8ff759107f1e7163ffbb1679ec01d82588129ccd7bbc1d61bcd5fb1644b4a057

                                                    SHA512

                                                    910060919130dc4fd0761a0b8287712f9e096781dae3131da8c0e58bfaa19183488b368e68821c057e224f5d3950e05d4eaf334f663bcf35daea170b79ef06b8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                    Filesize

                                                    6KB

                                                    MD5

                                                    47c8eb5ac38d7af0228aaf438edebdc5

                                                    SHA1

                                                    2c191bf9d4eacc80fd92c0fae6c333bbd1587b8a

                                                    SHA256

                                                    f7129d70dd15f90811de2ff1e1168ab73fb285ddae7b0cd81130f45c0daf43d9

                                                    SHA512

                                                    5bddb508ecb4697e07a1192cda3961f4d9e8a4fb062ef64eda92093c12713930654f8952a25d069b1ce111a458a81e6a2561e2e8a5fb9b506c13f328d9e3f6c9

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    cb36eb1ee83f3e39a5f7fd7595667462

                                                    SHA1

                                                    7fe679c89614232c4dfbf2ec7c6f3654253d88ce

                                                    SHA256

                                                    8c3984dee1f9574b0e93e2e491dfa7cb3926e72bdde697b36174b77eb9a81725

                                                    SHA512

                                                    0acb2e21395a5210db953c05b097bad8e412747b9a9ff2a0b8291811b609928c4c29f6f3fc5a31ca36e88a5d5dc799448660928649ad7caa2e962eb1628cc0c8

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    b479921e48ae90cb177f5d990614d16a

                                                    SHA1

                                                    0fbf024469a1dbd6319f486e4b1c32b5a4e44017

                                                    SHA256

                                                    37182a0a2226933844511a6ceaee91aec73060a36790221db1cc4b3a16132c41

                                                    SHA512

                                                    87d4a88a6939b6bb13c552ce7b3e7f6b4d4f3eb3f97511cc47efe541dc0568fcb4e4a0a4a466ffce042875e6b6b538aa7b521cd055528657c47c74f4bf31bff3

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58141f.TMP

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    9d39367f0364f3347163f8acc046f078

                                                    SHA1

                                                    40894a9a5ad8f1b5af159d5c13f4afe765fb7344

                                                    SHA256

                                                    95015fa3176254768c2808c2e5ce1fab6c65ee52c938965538291bd87db0ccb2

                                                    SHA512

                                                    a1366711e9f6fa37e784b6811be38575a817ca6c553cc8da01cf6c5396e1983de6a35e78079a2c5be73ebca73e308b71bf9f649aa531bc475196afc1fd442f34

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                    Filesize

                                                    16B

                                                    MD5

                                                    6752a1d65b201c13b62ea44016eb221f

                                                    SHA1

                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                    SHA256

                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                    SHA512

                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    10KB

                                                    MD5

                                                    341be647db91051a07f65e98db566ba6

                                                    SHA1

                                                    4939b055564771cb92835652c19aacf179045991

                                                    SHA256

                                                    273dd350dee05a101d1e48f08bca77184de271a998f587045858bfd91220e735

                                                    SHA512

                                                    40f9db63355eac6d82f90d1fc418a2d35390b136dfc8d51b9a08645264cc97be260fd9dfe5a79d29a33abf3a5c379d2678efd8cc73275438c07c007dbf4ca9b6

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                    Filesize

                                                    11KB

                                                    MD5

                                                    e5b4b334a08635429a9f58cc67231ab2

                                                    SHA1

                                                    bbc29ffcc72b29e093c5162e24fd46e784af0ce5

                                                    SHA256

                                                    18894515b9addbb1a423070c98d557d12366477337f720efdb590e9a07426aea

                                                    SHA512

                                                    782b7621c6b0d5e41179cd172027b182358b74d96d222ea38f72fae869c5e0e6ba70e450710d14147c21e05091d428e2d05b594e6b4b6c5118d1f148fb14662f

                                                  • C:\Users\Admin\AppData\Local\del.bat

                                                    Filesize

                                                    115B

                                                    MD5

                                                    f3517cbd484198b25b6e67eb202232e2

                                                    SHA1

                                                    bddc5645eca791472ae438f6099459983bb42419

                                                    SHA256

                                                    c7d853927c93ced4b6c6c44d0f2ccbbcfcfd569fddbf1add0505c89358d3b8d9

                                                    SHA512

                                                    44cc42c49d54ab885ed846aca80579bd56e639af9e3f9c8f5fd737e9472197bd53ab5f64cce4145c952035bac382078f0743f918a7b581f2a7758083f94eb06d

                                                  • C:\Users\Admin\AppData\Local\system.exe

                                                    Filesize

                                                    315KB

                                                    MD5

                                                    291a356ad9e5c2a4474195a3ecc08e7c

                                                    SHA1

                                                    660381700d6b87af03e9866c3d335e13c2accfc9

                                                    SHA256

                                                    55a7f15138e3c9922d24b42c98aa65aa2852274e249b60fe9248b57ad02c1cb1

                                                    SHA512

                                                    7e601a2094fb0a610b77a07a5b1672e1fe208378bbcd573a2dfdbdbbec1e21b10b5862bfad831fb1acf3be6631bd38bc04ba7740e738bff2ba3d77820cb8be75

                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Spelling\en-US\default.dic

                                                    Filesize

                                                    2B

                                                    MD5

                                                    f3b25701fe362ec84616a93a45ce9998

                                                    SHA1

                                                    d62636d8caec13f04e28442a0a6fa1afeb024bbb

                                                    SHA256

                                                    b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

                                                    SHA512

                                                    98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

                                                  • C:\Users\Admin\DOWNLO~1\THE-MA~1\THE-MA~1\BANKIN~1\DanaBot.dll

                                                    Filesize

                                                    2.4MB

                                                    MD5

                                                    7e76f7a5c55a5bc5f5e2d7a9e886782b

                                                    SHA1

                                                    fc500153dba682e53776bef53123086f00c0e041

                                                    SHA256

                                                    abd75572f897cdda88cec22922d15b509ee8c840fa5894b0aecbef6de23908a3

                                                    SHA512

                                                    0318e0040f4dbf954f27fb10a69bce2248e785a31d855615a1eaf303a772ad51d47906a113605d7bfd3c2b2265bf83c61538f78b071f85ee3c4948f5cde3fb24

                                                  • C:\Windows\SysWOW64\drivers\spoclsv.exe

                                                    Filesize

                                                    73KB

                                                    MD5

                                                    37e887b7a048ddb9013c8d2a26d5b740

                                                    SHA1

                                                    713b4678c05a76dbd22e6f8d738c9ef655e70226

                                                    SHA256

                                                    24c0638ff7571c7f4df5bcddd50bc478195823e934481fa3ee96eb1d1c4b4a1b

                                                    SHA512

                                                    99f74eb00c6f6d1cbecb4d88e1056222e236cb85cf2a421243b63cd481939d3c4693e08edde743722d3320c27573fbcc99bf749ff72b857831e4b6667374b8af

                                                  • memory/1176-463-0x0000000000400000-0x0000000000AAD000-memory.dmp

                                                    Filesize

                                                    6.7MB

                                                  • memory/1568-488-0x0000000000400000-0x0000000000444000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/1764-499-0x0000000000400000-0x0000000000455000-memory.dmp

                                                    Filesize

                                                    340KB

                                                  • memory/1764-493-0x0000000000400000-0x0000000000455000-memory.dmp

                                                    Filesize

                                                    340KB

                                                  • memory/2136-474-0x0000000010000000-0x0000000010030000-memory.dmp

                                                    Filesize

                                                    192KB

                                                  • memory/2136-472-0x00000000003D0000-0x0000000000445000-memory.dmp

                                                    Filesize

                                                    468KB

                                                  • memory/2136-470-0x0000000010000000-0x0000000010030000-memory.dmp

                                                    Filesize

                                                    192KB

                                                  • memory/2232-664-0x0000000000400000-0x000000000066B000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2232-464-0x0000000000400000-0x000000000066B000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2232-475-0x0000000000400000-0x000000000066B000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/2964-495-0x00000000005F0000-0x00000000005F4000-memory.dmp

                                                    Filesize

                                                    16KB

                                                  • memory/2964-500-0x0000000000400000-0x0000000000483000-memory.dmp

                                                    Filesize

                                                    524KB

                                                  • memory/2964-494-0x0000000000400000-0x0000000000483000-memory.dmp

                                                    Filesize

                                                    524KB

                                                  • memory/2964-496-0x00000000005B0000-0x00000000005D4000-memory.dmp

                                                    Filesize

                                                    144KB

                                                  • memory/2964-501-0x00000000005B0000-0x00000000005D4000-memory.dmp

                                                    Filesize

                                                    144KB

                                                  • memory/3356-491-0x0000000001000000-0x0000000001026000-memory.dmp

                                                    Filesize

                                                    152KB

                                                  • memory/3356-490-0x0000000001000000-0x0000000001026000-memory.dmp

                                                    Filesize

                                                    152KB

                                                  • memory/3880-461-0x00000000023C0000-0x000000000262B000-memory.dmp

                                                    Filesize

                                                    2.4MB

                                                  • memory/4076-479-0x00000000003D0000-0x0000000000445000-memory.dmp

                                                    Filesize

                                                    468KB

                                                  • memory/4076-478-0x0000000010000000-0x0000000010030000-memory.dmp

                                                    Filesize

                                                    192KB

                                                  • memory/4076-481-0x0000000010000000-0x0000000010030000-memory.dmp

                                                    Filesize

                                                    192KB

                                                  • memory/4956-531-0x00000000001A0000-0x000000000020E000-memory.dmp

                                                    Filesize

                                                    440KB

                                                  • memory/4956-535-0x0000000005340000-0x00000000058E4000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/4956-536-0x0000000004C40000-0x0000000004CD2000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/4956-540-0x0000000004C00000-0x0000000004C0A000-memory.dmp

                                                    Filesize

                                                    40KB

                                                  • memory/5052-483-0x0000000000400000-0x0000000000444000-memory.dmp

                                                    Filesize

                                                    272KB

                                                  • memory/5052-489-0x0000000000400000-0x0000000000444000-memory.dmp

                                                    Filesize

                                                    272KB