Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
20-06-2024 16:53
Static task
static1
Behavioral task
behavioral1
Sample
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe
Resource
win10v2004-20240611-en
General
-
Target
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe
-
Size
1.8MB
-
MD5
45dbb4e0cf278ab3d945630161b61a6f
-
SHA1
7d5c4cf2b0e9a00a1e5bb0c1163bcabb64de25e1
-
SHA256
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e
-
SHA512
e39a2321b71d854a1d7e545c2bb661b2a139deb1e86e3d16c1ce80d14cbc12e33431cd9eb2afbe444f5c92270ca8f2a2201a9cda17b666f5f85fff595ce36673
-
SSDEEP
49152:qyMI4Qktjt4vcv9o0FU6c2y3EwiUpVJJwYqA/0o79j:4ZRpLq0FUz2K1LDqYf7
Malware Config
Extracted
amadey
4.21
0e6740
http://147.45.47.155
-
install_dir
9217037dc9
-
install_file
explortu.exe
-
strings_key
8e894a8a4a3d0da8924003a561cfb244
-
url_paths
/ku4Nor9/index.php
Extracted
risepro
77.91.77.66:58709
Extracted
amadey
8254624243
e76b71
http://77.91.77.81
-
install_dir
8254624243
-
install_file
axplong.exe
-
strings_key
90049e51fabf09df0d6748e0b271922e
-
url_paths
/Kiru9gu/index.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
explortu.exe994033baa6.exeaxplong.exeexplortu.exeaxplong.exeexplortu.exe190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exe07c96e2d85.exeaxplong.exe7fdfa4e531.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 994033baa6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explortu.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 07c96e2d85.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ axplong.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7fdfa4e531.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
994033baa6.exeexplortu.exeaxplong.exeexplortu.exe190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exe07c96e2d85.exeaxplong.exeaxplong.exe7fdfa4e531.exeexplortu.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 994033baa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 994033baa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 07c96e2d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7fdfa4e531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 07c96e2d85.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion axplong.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7fdfa4e531.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explortu.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explortu.exe -
Executes dropped EXE 10 IoCs
Processes:
explortu.exeexplortu.exe07c96e2d85.exeaxplong.exe7fdfa4e531.exe994033baa6.exeaxplong.exeexplortu.exeaxplong.exeexplortu.exepid process 3704 explortu.exe 2956 explortu.exe 3960 07c96e2d85.exe 1416 axplong.exe 1056 7fdfa4e531.exe 1604 994033baa6.exe 4148 axplong.exe 3012 explortu.exe 3056 axplong.exe 3052 explortu.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
axplong.exe994033baa6.exeaxplong.exeexplortu.exe190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exe07c96e2d85.exeexplortu.exeexplortu.exe7fdfa4e531.exeaxplong.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 994033baa6.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplong.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 07c96e2d85.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine explortu.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine 7fdfa4e531.exe Key opened \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Wine axplong.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
explortu.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3433428765-2473475212-4279855560-1000\Software\Microsoft\Windows\CurrentVersion\Run\7fdfa4e531.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\7fdfa4e531.exe" explortu.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/1604-187-0x00000000002B0000-0x0000000000831000-memory.dmp autoit_exe behavioral2/memory/1604-224-0x00000000002B0000-0x0000000000831000-memory.dmp autoit_exe behavioral2/memory/1604-225-0x00000000002B0000-0x0000000000831000-memory.dmp autoit_exe behavioral2/memory/1604-231-0x00000000002B0000-0x0000000000831000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exeexplortu.exe07c96e2d85.exeaxplong.exe7fdfa4e531.exe994033baa6.exeaxplong.exeexplortu.exeaxplong.exeexplortu.exepid process 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe 3704 explortu.exe 2956 explortu.exe 3960 07c96e2d85.exe 1416 axplong.exe 1056 7fdfa4e531.exe 1604 994033baa6.exe 4148 axplong.exe 3012 explortu.exe 3056 axplong.exe 3052 explortu.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
explortu.exedescription pid process target process PID 3704 set thread context of 2956 3704 explortu.exe explortu.exe -
Drops file in Windows directory 2 IoCs
Processes:
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe07c96e2d85.exedescription ioc process File created C:\Windows\Tasks\explortu.job 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe File created C:\Windows\Tasks\axplong.job 07c96e2d85.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133633760315783139" chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3433428765-2473475212-4279855560-1000\{EA82C1BE-C427-4431-8BBB-0EEE58837DD4} chrome.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exeexplortu.exe07c96e2d85.exeaxplong.exe7fdfa4e531.exe994033baa6.exechrome.exeaxplong.exeexplortu.exeaxplong.exeexplortu.exechrome.exepid process 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe 3704 explortu.exe 3704 explortu.exe 2956 explortu.exe 2956 explortu.exe 3960 07c96e2d85.exe 3960 07c96e2d85.exe 1416 axplong.exe 1416 axplong.exe 1056 7fdfa4e531.exe 1056 7fdfa4e531.exe 1604 994033baa6.exe 1604 994033baa6.exe 3516 chrome.exe 3516 chrome.exe 4148 axplong.exe 4148 axplong.exe 3012 explortu.exe 3012 explortu.exe 3056 axplong.exe 3056 axplong.exe 3052 explortu.exe 3052 explortu.exe 2060 chrome.exe 2060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe Token: SeShutdownPrivilege 3516 chrome.exe Token: SeCreatePagefilePrivilege 3516 chrome.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
994033baa6.exechrome.exepid process 1604 994033baa6.exe 1604 994033baa6.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 3516 chrome.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
994033baa6.exechrome.exepid process 1604 994033baa6.exe 1604 994033baa6.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 3516 chrome.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe 1604 994033baa6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exeexplortu.exe07c96e2d85.exe994033baa6.exechrome.exedescription pid process target process PID 1668 wrote to memory of 3704 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe explortu.exe PID 1668 wrote to memory of 3704 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe explortu.exe PID 1668 wrote to memory of 3704 1668 190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 2956 3704 explortu.exe explortu.exe PID 3704 wrote to memory of 3960 3704 explortu.exe 07c96e2d85.exe PID 3704 wrote to memory of 3960 3704 explortu.exe 07c96e2d85.exe PID 3704 wrote to memory of 3960 3704 explortu.exe 07c96e2d85.exe PID 3960 wrote to memory of 1416 3960 07c96e2d85.exe axplong.exe PID 3960 wrote to memory of 1416 3960 07c96e2d85.exe axplong.exe PID 3960 wrote to memory of 1416 3960 07c96e2d85.exe axplong.exe PID 3704 wrote to memory of 1056 3704 explortu.exe 7fdfa4e531.exe PID 3704 wrote to memory of 1056 3704 explortu.exe 7fdfa4e531.exe PID 3704 wrote to memory of 1056 3704 explortu.exe 7fdfa4e531.exe PID 3704 wrote to memory of 1604 3704 explortu.exe 994033baa6.exe PID 3704 wrote to memory of 1604 3704 explortu.exe 994033baa6.exe PID 3704 wrote to memory of 1604 3704 explortu.exe 994033baa6.exe PID 1604 wrote to memory of 3516 1604 994033baa6.exe chrome.exe PID 1604 wrote to memory of 3516 1604 994033baa6.exe chrome.exe PID 3516 wrote to memory of 3060 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 3060 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 4496 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 1464 3516 chrome.exe chrome.exe PID 3516 wrote to memory of 1464 3516 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe"C:\Users\Admin\AppData\Local\Temp\190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\1000015002\07c96e2d85.exe"C:\Users\Admin\1000015002\07c96e2d85.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000016001\7fdfa4e531.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\7fdfa4e531.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000017001\994033baa6.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\994033baa6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account4⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb3948ab58,0x7ffb3948ab68,0x7ffb3948ab785⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1672 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:25⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2092 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2144 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3044 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3052 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4184 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4372 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:15⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4376 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4400 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
- Modifies registry class
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4796 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4828 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:85⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1816,i,13099126054811422487,13295005108031836274,131072 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exeC:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeC:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\1000015002\07c96e2d85.exeFilesize
1.8MB
MD55aba8d02db55352fcaee7314ce9b91b5
SHA13504b60322d45ab37292e8bab213db93ec7ced94
SHA2560060ccfc68f54630ef852047f39e72d80a724c2c02237cc28116908d1d736819
SHA512d0484241149a1189116895a214552f71a098f236d7d64dc291b5f6dffc798b5148211f581f80f762979d61a9481f1d49dec21d06065a94b853774b8936055b61
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
336B
MD52606e51f59bdee315778dbba89d7619f
SHA1f44da09930b48ed82dbadc3b2403a1f0bacfe1c5
SHA2561bb8a91a0b8152c767b5c09ef62500f9b10a82243cdf1981ffa109f4dfe21578
SHA51255be76e875204a539706961e32f8adff4b29f6d4da56e42e05ec01f8e5f3de126a51d45c99badb803a7b2ceaed13063f1a2a66492323d4b833dbcfed1ed7c5f8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5d0de3e128926e13206e4f1bf9aefaf2f
SHA1953f48a86ed2c7007ae99e699551dbc3e2764c00
SHA256276d2121dfd9dddb25a7f4120dd9d2a5f30c66a15fb538279ca4eb40f53b0b17
SHA51269a6b999bf823f9e141cf20e1302adf11808329278e074cfe9cb61c30187a9282afa4c930c955aad4265ef2bfee0a96b73c9237316b1d518e50bca2660f08d16
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
520B
MD5269ad4244094dd8e256d183b2224dde6
SHA17eea487f43dbba06cde4138ff18d844de51098e7
SHA25652586ea02f7e10819f5def1ae8a53eded7dc648e0fdae9a1d6c99bbaa3549a3b
SHA512f3834c99e1a6105705696ad36b8aa5b51f1097e4493b656993c3bcb0f2c03a3508c78fe3fe864a07352ff6212a3fcdf75bc504d71fcaf1557729f5c30f69df05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
522B
MD51af8b45290ffa118536bf4392b034782
SHA1820c97e644d52e3a934ea5137520235105732f46
SHA256b985b5855b8f0804d55a073ef51969d73ab1a2b2bf242897fba8e9480fe921a2
SHA5126ae2c2a6ae165d3f8a32129880d24542ca32fe31478fc67406beef0c7f4b686882aa32f8c0bd5a715069486f3f855c840791820912055fa20975c1fb3f4a8eec
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5c1b7f4bcb8f6d71e00fa79026aece712
SHA135221879d1024a3cae2af1dae63be56c12ad239f
SHA256395edfcf2543ea6b1834a64d1117a3a86747b936db8360f1f16726518223d06b
SHA5127f91919753e38a85d41e70d9bb1b4df2dd6679f0267198644453b665827000a4340bcdc930c90cc35212c440fc4d157182688184a2448f060b13430398a27607
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure PreferencesFilesize
16KB
MD5446abafb70faf87533f481f24fbdb6f3
SHA1b114d6e8fb3b0037cfd323aa8b7b7dc33585bcb2
SHA256bbbe2044ef6197a779e57e60becff453f53cea3df5bf433bfd166aef469a4bf6
SHA512df789ce172ab47a4c579286cb3577b636054261ab2d7cac489ae9001fa6fc2f3c9d7c0e901deaabf18acfd77a3570e1e6b6fefed8562f170950745c7e04d62b5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
269KB
MD584d8036731fad93bd677636f82282497
SHA1eef7ddfc0f0dd15de87be0d55bc8873d10830327
SHA256ed4377bf7a80f177fa0a33b9696b86a161aa1e8480a97777409382db4eab1bd9
SHA5123a7eaf611cad3390160fc51bb666fdb77eb35a607e5ddf8519dd000124f6bcf55f9ea669618dfaa681e1f3ae524e40e133e0f0395bbb245aeb41ecbc4ae4b931
-
C:\Users\Admin\AppData\Local\Temp\1000016001\7fdfa4e531.exeFilesize
2.3MB
MD53cf2e2014bc046f57224f0cec0f00157
SHA1ff26cb5f082db8d782e72402baed3f5af7c4c23f
SHA2567645d96448ad74f94966d5997b8d7a22df32bf9ed02d940bcbe7f587f9de58a5
SHA51266fa009e6a55f1f9c85ca9c4e20630971e13d0285a1804c6f51fe734d9b93583a82f615e97f6769ec87dd2026785ad89907eccd751136a11fcae079d8f7b6f6a
-
C:\Users\Admin\AppData\Local\Temp\1000017001\994033baa6.exeFilesize
2.3MB
MD58315efc4d16754a5d02938270f6ca01b
SHA1085eb12a0bc268a05e8dcc0b796991a475192767
SHA256de0f393bb2ba0f8da0300dcd6c7c0db03b915222eed80e287b00b4b0a3c85b58
SHA51214be79780f196ce086cce25f43ac93d049df551dd12c68ef19aef3a3bfd046385d09feae24dcdcd17176bcaa39aa5cea005242348a5718f88e4bf172e3156c51
-
C:\Users\Admin\AppData\Local\Temp\9217037dc9\explortu.exeFilesize
1.8MB
MD545dbb4e0cf278ab3d945630161b61a6f
SHA17d5c4cf2b0e9a00a1e5bb0c1163bcabb64de25e1
SHA256190c1a9206a596f8aa9f6f4d969e7c243eed05b2b799f05dadaec0c7afaa164e
SHA512e39a2321b71d854a1d7e545c2bb661b2a139deb1e86e3d16c1ce80d14cbc12e33431cd9eb2afbe444f5c92270ca8f2a2201a9cda17b666f5f85fff595ce36673
-
\??\pipe\crashpad_3516_OJNEXSJJNYTKJRBJMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1056-186-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-248-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-233-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-221-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-222-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-109-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-236-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-255-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1056-251-0x00000000003E0000-0x00000000009DD000-memory.dmpFilesize
6.0MB
-
memory/1416-220-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-247-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-250-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-178-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-235-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-254-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-209-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-232-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-283-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1416-89-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/1604-224-0x00000000002B0000-0x0000000000831000-memory.dmpFilesize
5.5MB
-
memory/1604-128-0x00000000002B0000-0x0000000000831000-memory.dmpFilesize
5.5MB
-
memory/1604-231-0x00000000002B0000-0x0000000000831000-memory.dmpFilesize
5.5MB
-
memory/1604-225-0x00000000002B0000-0x0000000000831000-memory.dmpFilesize
5.5MB
-
memory/1604-187-0x00000000002B0000-0x0000000000831000-memory.dmpFilesize
5.5MB
-
memory/1668-1-0x0000000077C36000-0x0000000077C38000-memory.dmpFilesize
8KB
-
memory/1668-2-0x00000000000A1000-0x00000000000CF000-memory.dmpFilesize
184KB
-
memory/1668-3-0x00000000000A0000-0x0000000000553000-memory.dmpFilesize
4.7MB
-
memory/1668-5-0x00000000000A0000-0x0000000000553000-memory.dmpFilesize
4.7MB
-
memory/1668-17-0x00000000000A0000-0x0000000000553000-memory.dmpFilesize
4.7MB
-
memory/1668-0-0x00000000000A0000-0x0000000000553000-memory.dmpFilesize
4.7MB
-
memory/2956-27-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-35-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-28-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/2956-30-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-52-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-55-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-50-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-47-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-48-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-46-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-31-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-66-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-44-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-34-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-56-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-45-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-36-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-51-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-65-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-37-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-41-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-40-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-43-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-42-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-39-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-54-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-38-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-53-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-24-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-29-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-33-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-32-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/2956-49-0x0000000000400000-0x00000000009E0000-memory.dmpFilesize
5.9MB
-
memory/3012-219-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3012-210-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3052-284-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3052-288-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3056-281-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/3056-286-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/3704-175-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-253-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-223-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-246-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-21-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-20-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-249-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-19-0x0000000000BD1000-0x0000000000BFF000-memory.dmpFilesize
184KB
-
memory/3704-18-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-234-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-73-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-108-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-203-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-270-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-176-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3704-127-0x0000000000BD0000-0x0000000001083000-memory.dmpFilesize
4.7MB
-
memory/3960-88-0x0000000000220000-0x00000000006D3000-memory.dmpFilesize
4.7MB
-
memory/3960-75-0x0000000000220000-0x00000000006D3000-memory.dmpFilesize
4.7MB
-
memory/4148-205-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB
-
memory/4148-216-0x0000000000900000-0x0000000000DB3000-memory.dmpFilesize
4.7MB