Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2024 20:37

General

  • Target

    2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe

  • Size

    1.8MB

  • MD5

    7f0a76732977427371079aac4e055a2e

  • SHA1

    c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6

  • SHA256

    2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc

  • SHA512

    88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05

  • SSDEEP

    49152:SRom2bAxlKp9HksGRtTvd/oheTzY0/oWnWNm4jDAATj:iom2WlKppG3vt5o4D4jDj

Malware Config

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

lumma

C2

https://ratiomun.cyou

Extracted

Family

stealc

Botnet

drum

C2

http://185.215.113.206

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 18 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 10 IoCs
  • Identifies Wine through registry keys 2 TTPs 9 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 12 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 17 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 11 IoCs
  • Kills process with taskkill 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
    "C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
      "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe
        "C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp1C66.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp1C66.tmp.bat
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1128
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:688
            • C:\Windows\system32\tasklist.exe
              Tasklist /fi "PID eq 2976"
              5⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:2028
            • C:\Windows\system32\find.exe
              find ":"
              5⤵
                PID:1872
              • C:\Windows\system32\timeout.exe
                Timeout /T 1 /Nobreak
                5⤵
                • Delays execution with timeout.exe
                PID:2680
              • C:\Windows\system32\tasklist.exe
                Tasklist /fi "PID eq 2976"
                5⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:560
              • C:\Windows\system32\find.exe
                find ":"
                5⤵
                  PID:1732
                • C:\Windows\system32\timeout.exe
                  Timeout /T 1 /Nobreak
                  5⤵
                  • Delays execution with timeout.exe
                  PID:792
                • C:\Windows\system32\tasklist.exe
                  Tasklist /fi "PID eq 2976"
                  5⤵
                  • Enumerates processes with tasklist
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1372
                • C:\Windows\system32\find.exe
                  find ":"
                  5⤵
                    PID:1368
                  • C:\Windows\system32\timeout.exe
                    Timeout /T 1 /Nobreak
                    5⤵
                    • Delays execution with timeout.exe
                    PID:1436
                  • C:\Windows\system32\tasklist.exe
                    Tasklist /fi "PID eq 2976"
                    5⤵
                    • Enumerates processes with tasklist
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2592
                  • C:\Windows\system32\find.exe
                    find ":"
                    5⤵
                      PID:2020
                    • C:\Windows\system32\timeout.exe
                      Timeout /T 1 /Nobreak
                      5⤵
                      • Delays execution with timeout.exe
                      PID:2040
                    • C:\Windows\system32\tasklist.exe
                      Tasklist /fi "PID eq 2976"
                      5⤵
                      • Enumerates processes with tasklist
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2212
                    • C:\Windows\system32\find.exe
                      find ":"
                      5⤵
                        PID:1052
                      • C:\Windows\system32\timeout.exe
                        Timeout /T 1 /Nobreak
                        5⤵
                        • Delays execution with timeout.exe
                        PID:2108
                      • C:\Windows\system32\tasklist.exe
                        Tasklist /fi "PID eq 2976"
                        5⤵
                        • Enumerates processes with tasklist
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1088
                      • C:\Windows\system32\find.exe
                        find ":"
                        5⤵
                          PID:996
                        • C:\Windows\system32\timeout.exe
                          Timeout /T 1 /Nobreak
                          5⤵
                          • Delays execution with timeout.exe
                          PID:1824
                        • C:\Windows\system32\tasklist.exe
                          Tasklist /fi "PID eq 2976"
                          5⤵
                          • Enumerates processes with tasklist
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2300
                        • C:\Windows\system32\find.exe
                          find ":"
                          5⤵
                            PID:1512
                          • C:\Windows\system32\timeout.exe
                            Timeout /T 1 /Nobreak
                            5⤵
                            • Delays execution with timeout.exe
                            PID:2316
                          • C:\Windows\system32\tasklist.exe
                            Tasklist /fi "PID eq 2976"
                            5⤵
                            • Enumerates processes with tasklist
                            • Suspicious use of AdjustPrivilegeToken
                            PID:768
                          • C:\Windows\system32\find.exe
                            find ":"
                            5⤵
                              PID:2588
                            • C:\Windows\system32\timeout.exe
                              Timeout /T 1 /Nobreak
                              5⤵
                              • Delays execution with timeout.exe
                              PID:2420
                            • C:\Windows\system32\tasklist.exe
                              Tasklist /fi "PID eq 2976"
                              5⤵
                              • Enumerates processes with tasklist
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2188
                            • C:\Windows\system32\find.exe
                              find ":"
                              5⤵
                                PID:2792
                              • C:\Windows\system32\timeout.exe
                                Timeout /T 1 /Nobreak
                                5⤵
                                • Delays execution with timeout.exe
                                PID:2776
                              • C:\Windows\system32\tasklist.exe
                                Tasklist /fi "PID eq 2976"
                                5⤵
                                • Enumerates processes with tasklist
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2532
                              • C:\Windows\system32\find.exe
                                find ":"
                                5⤵
                                  PID:2280
                                • C:\Windows\system32\timeout.exe
                                  Timeout /T 1 /Nobreak
                                  5⤵
                                  • Delays execution with timeout.exe
                                  PID:2912
                                • C:\Windows\system32\tasklist.exe
                                  Tasklist /fi "PID eq 2976"
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2972
                                • C:\Windows\system32\find.exe
                                  find ":"
                                  5⤵
                                    PID:3060
                                  • C:\Windows\system32\timeout.exe
                                    Timeout /T 1 /Nobreak
                                    5⤵
                                    • Delays execution with timeout.exe
                                    PID:2072
                                  • C:\Windows\system32\tasklist.exe
                                    Tasklist /fi "PID eq 2976"
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2976
                                  • C:\Windows\system32\find.exe
                                    find ":"
                                    5⤵
                                      PID:1760
                                • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Modifies system certificate store
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:380
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1316
                                    4⤵
                                    • Program crash
                                    PID:3144
                                • C:\Users\Admin\AppData\Local\Temp\1012123001\d666be5074.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1012123001\d666be5074.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1248
                                • C:\Users\Admin\AppData\Local\Temp\1012124001\500225b2dd.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1012124001\500225b2dd.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Modifies system certificate store
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1308
                                • C:\Users\Admin\AppData\Local\Temp\1012125001\ef1e11fb55.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1012125001\ef1e11fb55.exe"
                                  3⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1880
                                • C:\Users\Admin\AppData\Local\Temp\1012126001\3bd2fdfcbc.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1012126001\3bd2fdfcbc.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of SendNotifyMessage
                                  PID:700
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM firefox.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1088
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM chrome.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2548
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM msedge.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2312
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM opera.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1796
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill /F /IM brave.exe /T
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2644
                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                    "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                    4⤵
                                      PID:2500
                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                        5⤵
                                        • Checks processor information in registry
                                        • Modifies registry class
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:308
                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.0.711882642\802069160" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f3ce3f8-65c6-4af5-aea1-41c19c40084b} 308 "\\.\pipe\gecko-crash-server-pipe.308" 1332 101d5058 gpu
                                          6⤵
                                            PID:1344
                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.1.2110769125\329678556" -parentBuildID 20221007134813 -prefsHandle 1516 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {83e2eaeb-d4c5-4e69-a771-d0f87352992a} 308 "\\.\pipe\gecko-crash-server-pipe.308" 1544 e71b58 socket
                                            6⤵
                                              PID:1748
                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.2.1233028843\950635632" -childID 1 -isForBrowser -prefsHandle 1912 -prefMapHandle 1908 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c760740-ac66-4644-a5d3-3370e7c37828} 308 "\\.\pipe\gecko-crash-server-pipe.308" 2012 18491558 tab
                                              6⤵
                                                PID:1876
                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.3.1424820929\933816972" -childID 2 -isForBrowser -prefsHandle 2600 -prefMapHandle 2596 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c3afe478-3386-4416-bf1f-8a4c034c3ee8} 308 "\\.\pipe\gecko-crash-server-pipe.308" 2612 e69258 tab
                                                6⤵
                                                  PID:2588
                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.4.1318898117\1203857513" -childID 3 -isForBrowser -prefsHandle 3724 -prefMapHandle 3712 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {398c8715-3b74-4035-8bf1-e67342b29c95} 308 "\\.\pipe\gecko-crash-server-pipe.308" 3728 1bb0ef58 tab
                                                  6⤵
                                                    PID:3784
                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.5.531051074\1052042017" -childID 4 -isForBrowser -prefsHandle 3840 -prefMapHandle 3844 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {44bc7204-6bd8-4fd7-83ad-e47643d92983} 308 "\\.\pipe\gecko-crash-server-pipe.308" 3828 1bb0d758 tab
                                                    6⤵
                                                      PID:3820
                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="308.6.1022526763\353753388" -childID 5 -isForBrowser -prefsHandle 4008 -prefMapHandle 4012 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 748 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ce01504-cc1b-44c1-ae9f-247c0e37f13f} 308 "\\.\pipe\gecko-crash-server-pipe.308" 3920 1bb0e058 tab
                                                      6⤵
                                                        PID:3828
                                                • C:\Users\Admin\AppData\Local\Temp\1012127001\ff77028c6e.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1012127001\ff77028c6e.exe"
                                                  3⤵
                                                  • Modifies Windows Defender Real-time Protection settings
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Windows security modification
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3088
                                                • C:\Users\Admin\AppData\Local\Temp\1012128001\534e944be9.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1012128001\534e944be9.exe"
                                                  3⤵
                                                  • Enumerates VirtualBox registry keys
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3676
                                                • C:\Users\Admin\AppData\Local\Temp\1012129001\rhnew.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\1012129001\rhnew.exe"
                                                  3⤵
                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                  • Checks BIOS information in registry
                                                  • Executes dropped EXE
                                                  • Identifies Wine through registry keys
                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3756

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                              Filesize

                                              15KB

                                              MD5

                                              96c542dec016d9ec1ecc4dddfcbaac66

                                              SHA1

                                              6199f7648bb744efa58acf7b96fee85d938389e4

                                              SHA256

                                              7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                              SHA512

                                              cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                            • C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe

                                              Filesize

                                              5.6MB

                                              MD5

                                              23b25ce90f70ffa0435db8df6a6764f2

                                              SHA1

                                              72d0c052f26309704f13c090495c3cdea4ed1bf2

                                              SHA256

                                              9165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3

                                              SHA512

                                              b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec

                                            • C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe

                                              Filesize

                                              1.7MB

                                              MD5

                                              ff4cf493ac5f7663d1cfc243e6646eb7

                                              SHA1

                                              ff7184eae695580f1e86fac340925c7f01f4de6d

                                              SHA256

                                              72a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748

                                              SHA512

                                              1eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b

                                            • C:\Users\Admin\AppData\Local\Temp\1012122001\file.exe

                                              Filesize

                                              5KB

                                              MD5

                                              5f603aafcf0e4920b7b6273072c9889f

                                              SHA1

                                              bbfc8b2ddf757f00769a013ab944cc7663c3402b

                                              SHA256

                                              a3c47b97a9e4e5bf9e9d1c76b1f16c9758f30f03d07768e13b066b8742537442

                                              SHA512

                                              04879145e8efc89c0dbe9748df45f14ce0ee4fda4e82fd7b75f3dcc1d118ed322d1ed987b474f631f7609902082e6716e9b0408439801cd276a62c341cd382bc

                                            • C:\Users\Admin\AppData\Local\Temp\1012123001\d666be5074.exe

                                              Filesize

                                              1.9MB

                                              MD5

                                              82d1397fb388fe6e4b7c66b0ae4bdbe4

                                              SHA1

                                              d979b5399d577b53b63b428c4a35abd30d6cc9de

                                              SHA256

                                              b3bab1d09ce9738f8bcf2c838086eaf628715df4fe99ef26c7c85b6e9b9a6443

                                              SHA512

                                              47de07a2595067569a1ded7dd330f81817334d9442997cf25af977ecac04df5827d4475145cca0f8cf457002d147bed789cc2fc24d275fcff129d14a41b0531a

                                            • C:\Users\Admin\AppData\Local\Temp\1012124001\500225b2dd.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              5e384bc6b7285a6ac5237864932b36c5

                                              SHA1

                                              e209c0aa850aa07a620a14c6414552496e867209

                                              SHA256

                                              dc71955c6330cec834ececf0776af74c62c9e0ea6278e25d0719c781000914a6

                                              SHA512

                                              2757a505ece762122bc28fd9763cb18c0ac375adfefc73bb22eb01c627db8b30d215064388f8acf813d36dea0fee42140f878de3085b8e3e90918e153e56e920

                                            • C:\Users\Admin\AppData\Local\Temp\1012125001\ef1e11fb55.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              a8d5d653a05c2b4746988e9c1a0e5681

                                              SHA1

                                              67ff7060ba5430fb8c5da54a885f8f4eadae2ea4

                                              SHA256

                                              f8f6069c106b01977f2a7c1d222d212d57041ae76ad1709bc7d51e2316f32110

                                              SHA512

                                              3382733b2a70f3971b9834cc53549e0f890e04ad7ac1469b08a5bf89bfc477e79ef646ce2753c46a7c68ee63999f4d8399127cf3ea5c25b28d36d28f471e653d

                                            • C:\Users\Admin\AppData\Local\Temp\1012126001\3bd2fdfcbc.exe

                                              Filesize

                                              944KB

                                              MD5

                                              259492d195d527bb189e7d637a276fb2

                                              SHA1

                                              51495545debde951ee59e2e6f1904084512f6611

                                              SHA256

                                              4b8ae3b0c2394a0f4294fede9d66d6e6c833b3bae011ba301c2ed0cfb80f4107

                                              SHA512

                                              d9b8bd327836019688e5fa97ae16731c861740449974e6dcad857fb5de8b39b9069011215e48aec86a8362c5f89706bff6bf11de77da9206c475846dc66ec99d

                                            • C:\Users\Admin\AppData\Local\Temp\1012127001\ff77028c6e.exe

                                              Filesize

                                              2.7MB

                                              MD5

                                              02ca12ec4f754b8c5a6d65e96102cac7

                                              SHA1

                                              fdf50b5fab6a4ad4a4b5dab0ed2e6b670f17cca5

                                              SHA256

                                              514deaa8dd99468f1d8e6c750641a00b8aadf4c2171b3c1fa984ec4e2e6cd097

                                              SHA512

                                              7cbea96a7883022a44a1ef5e14772fa7ccb1962931bd8ffd7c726e130dcca989e49ecbce844fe23be732a2c2d3cae92be53a0b0fa050651e69744a0a2aa82eae

                                            • C:\Users\Admin\AppData\Local\Temp\1012128001\534e944be9.exe

                                              Filesize

                                              4.3MB

                                              MD5

                                              cabe7aa4a6430daab83f5d7f37aca904

                                              SHA1

                                              0c8d8e4b20c857c52231b4325e808a3d90c73505

                                              SHA256

                                              03fe3055e0b12aa4a2186a0a89ea58dfdf6a071679ba3950202204b3e62e7c8d

                                              SHA512

                                              fae4b2dae145c35e0bdec6c3977186d1356f6065413b364d2f373cef5367da6bc6b7a2b31154df5ad5c0608fa3d165595115187297fbe88d621c51fbd5628159

                                            • C:\Users\Admin\AppData\Local\Temp\1012129001\rhnew.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              a84456172908e096d0ac6272b9503e08

                                              SHA1

                                              8b64d38bae9fc390e621323e9e91eb8f7def421c

                                              SHA256

                                              4f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128

                                              SHA512

                                              3237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800

                                            • C:\Users\Admin\AppData\Local\Temp\Cab6B03.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\Local\Temp\Tar6EBD.tmp

                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe

                                              Filesize

                                              1.8MB

                                              MD5

                                              7f0a76732977427371079aac4e055a2e

                                              SHA1

                                              c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6

                                              SHA256

                                              2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc

                                              SHA512

                                              88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05

                                            • C:\Users\Admin\AppData\Local\Temp\tmp1C66.tmp.bat

                                              Filesize

                                              286B

                                              MD5

                                              b59e269037f2d38443feff1208f9584e

                                              SHA1

                                              2a5177e46bce48a82d7950e536e56853a3327c49

                                              SHA256

                                              0884bb71bbe8f2ffa4380c84868bb50e6eabefe39f271e437ec20b4f2dc5e671

                                              SHA512

                                              3e864ae2a7dc2d855412868bcf008041ff1487faeb798a4fcd77bf907715ac5bf9d8869898689bdf246459a873a5d8855798b0831448277b0c9474edb27c13ea

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                              Filesize

                                              442KB

                                              MD5

                                              85430baed3398695717b0263807cf97c

                                              SHA1

                                              fffbee923cea216f50fce5d54219a188a5100f41

                                              SHA256

                                              a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                              SHA512

                                              06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                              Filesize

                                              8.0MB

                                              MD5

                                              a01c5ecd6108350ae23d2cddf0e77c17

                                              SHA1

                                              c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                              SHA256

                                              345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                              SHA512

                                              b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin

                                              Filesize

                                              2KB

                                              MD5

                                              a9532d252bc92b0eb500a64a4924c0b7

                                              SHA1

                                              1e23d1ffeb09936bcf3bdf3bdc0a9449b0c821bb

                                              SHA256

                                              411a52f78403a116dd7e9e57b2931c0c3cf5df684b1227735f49f2a3d7632177

                                              SHA512

                                              b433f7c904acf455a5d31971c92321641ea551554791b1e1c89ed88196fcc6e4eecf3ceeac7bc531c84fe2a20a7119cf35b1625dc93f845ac23d595e057e768c

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\1e631ac3-a3b4-4a4c-90f9-2e4e1d57e860

                                              Filesize

                                              745B

                                              MD5

                                              f14e6dba1af168c242d5a20089410ea3

                                              SHA1

                                              da3d0d321a91b32091a313125cc7b5604a448b23

                                              SHA256

                                              a91c45e6768a96632f4330d634dd6d6f4aee53c9d0c5456964ab703f68df3302

                                              SHA512

                                              bd4c59b9a9820148e217d6ec5bbc74a8c3be49034ac938d85cbf30604375cc639569463db40130167cccb4b2bd33fceb59df5952fcca6d330944baf3b6474c4d

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\7bd5ccff-2dcd-4669-803c-3b08d4677b90

                                              Filesize

                                              10KB

                                              MD5

                                              9e29ac3962d3bc1b0b9175354c88e60e

                                              SHA1

                                              6e89226c59c2b6fab1f31a455a1b53ea5b4b14b9

                                              SHA256

                                              7011aa4f3f2700f521e8dafad81bb356754c518e823d2c662cf0b63e42cb57c9

                                              SHA512

                                              944c92a0a3907dfeaf069d7f1f8e2ca24e13792da023cef0498bbd59fbba77baf894482d80ce9555b980a4222d854560691822e1aff71c1fd8b80f76ac25874f

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                              Filesize

                                              997KB

                                              MD5

                                              fe3355639648c417e8307c6d051e3e37

                                              SHA1

                                              f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                              SHA256

                                              1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                              SHA512

                                              8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                              Filesize

                                              116B

                                              MD5

                                              3d33cdc0b3d281e67dd52e14435dd04f

                                              SHA1

                                              4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                              SHA256

                                              f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                              SHA512

                                              a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                              Filesize

                                              479B

                                              MD5

                                              49ddb419d96dceb9069018535fb2e2fc

                                              SHA1

                                              62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                              SHA256

                                              2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                              SHA512

                                              48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                              Filesize

                                              372B

                                              MD5

                                              8be33af717bb1b67fbd61c3f4b807e9e

                                              SHA1

                                              7cf17656d174d951957ff36810e874a134dd49e0

                                              SHA256

                                              e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                              SHA512

                                              6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                              Filesize

                                              11.8MB

                                              MD5

                                              33bf7b0439480effb9fb212efce87b13

                                              SHA1

                                              cee50f2745edc6dc291887b6075ca64d716f495a

                                              SHA256

                                              8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                              SHA512

                                              d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                              Filesize

                                              1KB

                                              MD5

                                              688bed3676d2104e7f17ae1cd2c59404

                                              SHA1

                                              952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                              SHA256

                                              33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                              SHA512

                                              7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                              Filesize

                                              1KB

                                              MD5

                                              937326fead5fd401f6cca9118bd9ade9

                                              SHA1

                                              4526a57d4ae14ed29b37632c72aef3c408189d91

                                              SHA256

                                              68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                              SHA512

                                              b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs-1.js

                                              Filesize

                                              7KB

                                              MD5

                                              3681fad67abc4fb730906514c9ba8109

                                              SHA1

                                              9740fbb71ec19fffbb52b965ec4755a3ccaccf83

                                              SHA256

                                              f7db0967d19b0a451ca4d5db7e16f78b989549324770f2cad4d4c28c1069faac

                                              SHA512

                                              1194db374a09ec53fd196fabe0c0d3c27ddfa6166944939f2ebee9966bb66675a54359edc93d98c5da15dd60dff7ec9c1db083c6161b252a5bff09e230954345

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs.js

                                              Filesize

                                              6KB

                                              MD5

                                              a8d63d69d0689faf3a15a2c373ab67db

                                              SHA1

                                              b86b431f80757e0843519e97cccd61fd07c510c6

                                              SHA256

                                              877ecb7295400b145e9608eb2c32b98421b914d1c53eccfc5a493e72d96ebc3e

                                              SHA512

                                              91d75de80b34752c0ce13e53759aeb130cc53a018fc04d4def38a2e7894d091e5351179121ca4d3bb196457c622d7ca6ab81858b0eeb5fd369590ba5b2e8b5d0

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs.js

                                              Filesize

                                              6KB

                                              MD5

                                              f1911a3d0ffc620476b30cf4c3c87f10

                                              SHA1

                                              b7e8cb7eb15d35eb97d5f56d38a3905b4f9fe9e6

                                              SHA256

                                              482d53791344470a4fb7fda12fa87d0b96d0e596f5c22fbc0e4fbf01241a9433

                                              SHA512

                                              01140b1e7676032b2d95e9288654f22b1840a0fca93ab2f31280fdee738138894288254acb3196b5a70964e3a7e32473d09f8a26b915b2683b210583c8190edd

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\prefs.js

                                              Filesize

                                              7KB

                                              MD5

                                              6f27319dd1e72bfdf078bf7e9b94be7c

                                              SHA1

                                              d529ce1dc911c3be9e0f5af5908e3de63d5a1844

                                              SHA256

                                              fc6bb84d1efa4c09f272c827ecaf407f9503de764d04bcdf6fa994f5fb31b810

                                              SHA512

                                              8c790653fbc343b5b32da67d25af9eaa6f13c1e1a135cf52346b1917513605ae084fa2b99f4c2e71c14fd7f42859e26b7db872a90d90ce3c99a961a2b85d5cae

                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4

                                              Filesize

                                              4KB

                                              MD5

                                              a9afed9ba8362ad89478c3401bc4abe6

                                              SHA1

                                              66a04b611cc3670c3733a09072f3583e99263567

                                              SHA256

                                              d9114c63c227cf9bfd5ab52efe14a31253f8453a7c1bfc16df078af7f25cf627

                                              SHA512

                                              9d35ea42b1e6c199d50094d92af90a0806791585461b60943d25befd8078bb0dae5f9fafe50ba1de4ec0b594e2472393c82ce918148f738d0aa96f9b68705d8b

                                            • \Users\Admin\AppData\Local\Temp\Costura\A54E036D2DCD19384E8EA53862E0DD8F\64\sqlite.interop.dll

                                              Filesize

                                              1.7MB

                                              MD5

                                              65ccd6ecb99899083d43f7c24eb8f869

                                              SHA1

                                              27037a9470cc5ed177c0b6688495f3a51996a023

                                              SHA256

                                              aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

                                              SHA512

                                              533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

                                            • memory/380-114-0x0000000000200000-0x000000000068B000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/380-117-0x0000000000200000-0x000000000068B000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/380-401-0x0000000000200000-0x000000000068B000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/380-176-0x0000000000200000-0x000000000068B000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/380-65-0x0000000000200000-0x000000000068B000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/1248-174-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-556-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-570-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-154-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-558-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-579-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-406-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-113-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-575-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-553-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-577-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-573-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-539-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1248-457-0x0000000000400000-0x0000000000C68000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/1308-177-0x00000000008C0000-0x0000000000D54000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1308-132-0x00000000008C0000-0x0000000000D54000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1308-192-0x00000000008C0000-0x0000000000D54000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1308-450-0x00000000008C0000-0x0000000000D54000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1308-422-0x00000000008C0000-0x0000000000D54000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/1880-159-0x0000000000E60000-0x0000000001509000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/1880-156-0x0000000000E60000-0x0000000001509000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/2292-3-0x0000000000E90000-0x0000000001345000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2292-20-0x0000000006ED0000-0x0000000007385000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2292-1-0x0000000077A00000-0x0000000077A02000-memory.dmp

                                              Filesize

                                              8KB

                                            • memory/2292-2-0x0000000000E91000-0x0000000000EBF000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2292-0-0x0000000000E90000-0x0000000001345000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2292-5-0x0000000000E90000-0x0000000001345000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2292-18-0x0000000000E90000-0x0000000001345000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-21-0x0000000000301000-0x000000000032F000-memory.dmp

                                              Filesize

                                              184KB

                                            • memory/2844-62-0x0000000006B40000-0x0000000006FCB000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/2844-131-0x0000000007470000-0x0000000007904000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/2844-578-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-28-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-135-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-439-0x0000000007470000-0x000000000772E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/2844-294-0x0000000007470000-0x0000000007B19000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/2844-451-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-576-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-94-0x0000000006B40000-0x0000000006FCB000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/2844-136-0x0000000007470000-0x0000000007CD8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/2844-27-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-574-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-137-0x0000000007470000-0x0000000007CD8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/2844-466-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-26-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-25-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-23-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-22-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-93-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-19-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-282-0x0000000007470000-0x0000000007B19000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/2844-292-0x0000000007470000-0x000000000772E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/2844-347-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-63-0x0000000006B40000-0x0000000006FCB000-memory.dmp

                                              Filesize

                                              4.5MB

                                            • memory/2844-572-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-112-0x0000000007470000-0x0000000007CD8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/2844-155-0x0000000007470000-0x0000000007B19000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/2844-566-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-551-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-175-0x0000000007470000-0x0000000007904000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/2844-157-0x0000000007470000-0x0000000007B19000-memory.dmp

                                              Filesize

                                              6.7MB

                                            • memory/2844-555-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2844-106-0x0000000007470000-0x0000000007CD8000-memory.dmp

                                              Filesize

                                              8.4MB

                                            • memory/2844-557-0x0000000000300000-0x00000000007B5000-memory.dmp

                                              Filesize

                                              4.7MB

                                            • memory/2976-42-0x0000000000CF0000-0x0000000001292000-memory.dmp

                                              Filesize

                                              5.6MB

                                            • memory/3088-307-0x0000000000BE0000-0x0000000000E9E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3088-306-0x0000000000BE0000-0x0000000000E9E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3088-453-0x0000000000BE0000-0x0000000000E9E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3088-440-0x0000000000BE0000-0x0000000000E9E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3088-293-0x0000000000BE0000-0x0000000000E9E000-memory.dmp

                                              Filesize

                                              2.7MB

                                            • memory/3676-465-0x0000000001390000-0x000000000205E000-memory.dmp

                                              Filesize

                                              12.8MB

                                            • memory/3676-458-0x0000000001390000-0x000000000205E000-memory.dmp

                                              Filesize

                                              12.8MB

                                            • memory/3756-554-0x00000000008F0000-0x0000000000D8F000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/3756-546-0x00000000008F0000-0x0000000000D8F000-memory.dmp

                                              Filesize

                                              4.6MB

                                            • memory/3756-464-0x00000000008F0000-0x0000000000D8F000-memory.dmp

                                              Filesize

                                              4.6MB