Resubmissions

01-07-2024 10:57

240701-m2gvna1bmr 10

27-06-2024 14:07

240627-re4s5axbqm 10

26-06-2024 21:27

240626-1awrdsvdkd 10

Analysis

  • max time kernel
    103s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 14:07

General

  • Target

    2379b88d09d15ee3b0e5a6cd83ac92086db55203aafa63149b1216b22ca4837c.exe

  • Size

    1.9MB

  • MD5

    f7b7a8eb191d45b9cf730d6fe78d36e1

  • SHA1

    0b7a7220d686c904b0ea89b6e036fb21acf0f85b

  • SHA256

    2379b88d09d15ee3b0e5a6cd83ac92086db55203aafa63149b1216b22ca4837c

  • SHA512

    b282e77a5855c5b302139740dfc870eec9a358669b84a8a35ccbef6abc40c4182fb34cf24d17bd5012173e71b8d7c7ddecc834248a470e7e9cffc3cdd19a4b36

  • SSDEEP

    49152:0YUvB6P4Zu2Zrq9Lp8lt+YPawAYsOWgu30w:KwPpN0tviwAY+g0n

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

123

C2

185.215.113.67:40960

Extracted

Family

redline

Botnet

06-25-24

C2

85.28.47.7:17210

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Monster Stealer. 2 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • XMRig Miner payload 15 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 20 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 34 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Power Settings 1 TTPs 16 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 5 IoCs
  • Launches sc.exe 18 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2379b88d09d15ee3b0e5a6cd83ac92086db55203aafa63149b1216b22ca4837c.exe
    "C:\Users\Admin\AppData\Local\Temp\2379b88d09d15ee3b0e5a6cd83ac92086db55203aafa63149b1216b22ca4837c.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 108
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:568
      • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
        "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1748
        • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
          "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system certificate store
          • Suspicious use of WriteProcessMemory
          PID:2052
          • C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe
            "C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe"
            5⤵
            • Executes dropped EXE
            PID:2088
          • C:\Users\Admin\AppData\Local\Temp\1000023001\FirstZ.exe
            "C:\Users\Admin\AppData\Local\Temp\1000023001\FirstZ.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            PID:428
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
              6⤵
              • Command and Scripting Interpreter: PowerShell
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2248
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
              6⤵
                PID:1736
                • C:\Windows\system32\wusa.exe
                  wusa /uninstall /kb:890830 /quiet /norestart
                  7⤵
                  • Drops file in Windows directory
                  PID:1428
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop UsoSvc
                6⤵
                • Launches sc.exe
                PID:928
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                6⤵
                • Launches sc.exe
                PID:2360
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop wuauserv
                6⤵
                • Launches sc.exe
                PID:2488
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop bits
                6⤵
                • Launches sc.exe
                PID:2024
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop dosvc
                6⤵
                • Launches sc.exe
                PID:2688
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2280
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1012
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1848
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1592
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe delete "WSNKISKT"
                6⤵
                • Launches sc.exe
                PID:2264
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe create "WSNKISKT" binpath= "C:\ProgramData\wikombernizc\reakuqnanrkn.exe" start= "auto"
                6⤵
                • Launches sc.exe
                PID:1124
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop eventlog
                6⤵
                • Launches sc.exe
                PID:2096
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start "WSNKISKT"
                6⤵
                • Launches sc.exe
                PID:1960
        • C:\Users\Admin\AppData\Local\Temp\1000108001\ldr.exe
          "C:\Users\Admin\AppData\Local\Temp\1000108001\ldr.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1860
          • C:\Users\Admin\AppData\Local\Temp\28feeece5c\Hkbsse.exe
            "C:\Users\Admin\AppData\Local\Temp\28feeece5c\Hkbsse.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2240
            • C:\Users\Admin\AppData\Local\Temp\1000012001\stl.exe
              "C:\Users\Admin\AppData\Local\Temp\1000012001\stl.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2140
              • C:\Users\Admin\AppData\Local\Temp\1000012001\stl.exe
                C:\Users\Admin\AppData\Local\Temp\1000012001\stl.exe
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1572
            • C:\Users\Admin\AppData\Local\Temp\1000013001\rig.exe
              "C:\Users\Admin\AppData\Local\Temp\1000013001\rig.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              PID:2892
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:760
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2272
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1144
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2040
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe delete "xjuumoinznsp"
                6⤵
                • Launches sc.exe
                PID:2088
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe create "xjuumoinznsp" binpath= "C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe" start= "auto"
                6⤵
                • Launches sc.exe
                PID:2264
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop eventlog
                6⤵
                • Launches sc.exe
                PID:1124
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start "xjuumoinznsp"
                6⤵
                • Launches sc.exe
                PID:1972
        • C:\Users\Admin\AppData\Local\Temp\1000109001\alex5555555.exe
          "C:\Users\Admin\AppData\Local\Temp\1000109001\alex5555555.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 108
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1704
        • C:\Users\Admin\AppData\Local\Temp\1000110001\123.exe
          "C:\Users\Admin\AppData\Local\Temp\1000110001\123.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
          "C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe"
          3⤵
          • Executes dropped EXE
          PID:2976
        • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
          "C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1772
        • C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe
          "C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2324
          • C:\Users\Admin\AppData\Local\Temp\onefile_2324_133639709137694000\stub.exe
            "C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2880
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:2060
      • C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe
        C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        PID:1984
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:1860
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:1924
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:1524
        • C:\Windows\system32\powercfg.exe
          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
          2⤵
          • Power Settings
          • Suspicious use of AdjustPrivilegeToken
          PID:2352
        • C:\Windows\explorer.exe
          explorer.exe
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2876
      • C:\ProgramData\wikombernizc\reakuqnanrkn.exe
        C:\ProgramData\wikombernizc\reakuqnanrkn.exe
        1⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        PID:1860
        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:820
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
          2⤵
            PID:3008
            • C:\Windows\system32\wusa.exe
              wusa /uninstall /kb:890830 /quiet /norestart
              3⤵
              • Drops file in Windows directory
              PID:912
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop UsoSvc
            2⤵
            • Launches sc.exe
            PID:2580
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop WaaSMedicSvc
            2⤵
            • Launches sc.exe
            PID:2236
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop wuauserv
            2⤵
            • Launches sc.exe
            PID:2672
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop bits
            2⤵
            • Launches sc.exe
            PID:1496
          • C:\Windows\system32\sc.exe
            C:\Windows\system32\sc.exe stop dosvc
            2⤵
            • Launches sc.exe
            PID:2616
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2356
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2060
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:2812
          • C:\Windows\system32\powercfg.exe
            C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
            2⤵
            • Power Settings
            • Suspicious use of AdjustPrivilegeToken
            PID:1520
          • C:\Windows\system32\conhost.exe
            C:\Windows\system32\conhost.exe
            2⤵
              PID:1548
            • C:\Windows\explorer.exe
              explorer.exe
              2⤵
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2444
          • C:\Program Files\VideoLAN\VLC\vlc.exe
            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WriteSkip.au"
            1⤵
              PID:824
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SubmitUninstall.vssm
              1⤵
              • Modifies registry class
              PID:1428
            • C:\Windows\system32\rundll32.exe
              "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\StepExpand.vssm
              1⤵
                PID:2168
              • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
                "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
                1⤵
                  PID:1152
                • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                  "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ResetSuspend.docx"
                  1⤵
                    PID:2828
                  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\ResetSuspend.docx"
                    1⤵
                      PID:2092
                    • C:\Windows\system32\rundll32.exe
                      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\RestoreConvertFrom.001
                      1⤵
                        PID:1144
                      • C:\Windows\system32\rundll32.exe
                        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\RestoreConvertFrom.001
                        1⤵
                          PID:1012
                        • C:\Windows\system32\rundll32.exe
                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\RestoreConvertFrom.001
                          1⤵
                            PID:2016
                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendOut.mpg"
                            1⤵
                              PID:1040
                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                              "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendOut.mpg"
                              1⤵
                                PID:2012
                              • C:\Windows\system32\rundll32.exe
                                "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SplitSkip.vstx
                                1⤵
                                  PID:1496
                                • C:\Windows\system32\rundll32.exe
                                  "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\SplitSkip.vstx
                                  1⤵
                                    PID:2616
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\ReadGrant.vbs"
                                    1⤵
                                      PID:2036
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\ReadGrant.vbs"
                                      1⤵
                                        PID:2392
                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideRegister.mpeg"
                                        1⤵
                                          PID:912
                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\HideRegister.mpeg"
                                          1⤵
                                            PID:1800
                                          • C:\Windows\System32\xpsrchvw.exe
                                            "C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\AddDebug.xps"
                                            1⤵
                                              PID:3064
                                            • C:\Program Files\VideoLAN\VLC\vlc.exe
                                              "C:\Program Files\VideoLAN\VLC\vlc.exe"
                                              1⤵
                                                PID:2956

                                              Network

                                              MITRE ATT&CK Matrix

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416
                                                Filesize

                                                1KB

                                                MD5

                                                55540a230bdab55187a841cfe1aa1545

                                                SHA1

                                                363e4734f757bdeb89868efe94907774a327695e

                                                SHA256

                                                d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

                                                SHA512

                                                c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
                                                Filesize

                                                230B

                                                MD5

                                                70a026e872345cdd86add9e4a1eeedc5

                                                SHA1

                                                5c61d1588fa002edd9994493feff27803faf1a8a

                                                SHA256

                                                bec6425db4269cc1eaba6ef799a31c8ee8f0179dc36211e5f310c8c5da77fc42

                                                SHA512

                                                6a149ce76752c0e7e0a3cbfd6eb4dd404f3f6fb6eed172b26724a550f22eb25830b90e3e4365a76fd5580269db53f094f68e1c38538f9e42ef951807bcc3e9e9

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                21780c7e877fc2ce25dd435057d32e66

                                                SHA1

                                                99019922619159e6aa2f62dedbeb02b16b3d2bd9

                                                SHA256

                                                7a41aee6ad370b5aa7b49d0c62b464267268d53f2d548fddee7decdaa76cff54

                                                SHA512

                                                a084228b915cb62dccd5fbb4a0e93f93716e776c479b18e5c0c7daf3c5d0afdc5475c40bebbcba3c8f2393011e786767f8fc823e1cd163dcfc643e5d01e24d9a

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                b10982624920562da273b440e4a05ffc

                                                SHA1

                                                17ec3149ee2c3ea9c8d5946b747327573f11e218

                                                SHA256

                                                538049938ac43341012c0b5b21b915259acd1fe096604325c425da68fe638edd

                                                SHA512

                                                e287011b60084c7eb76059d1921874df37a1b9b8927f60c1eb40745987f3c4dfbe557486afb5eda8ef296d9d9fbf7b86b9b7c8c360093e85b7a1ef5895905aee

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
                                                Filesize

                                                342B

                                                MD5

                                                73cc87fa48f60eef72337c065dacb77d

                                                SHA1

                                                ef6af4f9a9aa032e81d8f66da8ae5c9ae69d0ac7

                                                SHA256

                                                7d6f31310ac88861a935ad954449e67c0e5959baabdf6969c8277febcd86715d

                                                SHA512

                                                52fc106430b8ba641be9f6136fc0c4d22e47b8ee5981debd72c5bcb9764d68a3ec2d802df19f40f7eb058a01eba97449da5a4c9a5d629024d818e5f5a27aecae

                                              • C:\Users\Admin\AppData\Local\Temp\1000012001\stl.exe
                                                Filesize

                                                511KB

                                                MD5

                                                2d92c64d986c4640e4cb5bc41cb38821

                                                SHA1

                                                bfc8e36ac6e2e8e6d44cfbc421307bbd58036dd5

                                                SHA256

                                                31dd0e69fb3a0a0999aa228d766e36033bbf1e482bdb93912705850badfba7b0

                                                SHA512

                                                4975350e13824fe78e937fe9cf84f86d6de502e588cf219ba2d73a171b74af4382b6b134033cc4cb590a6068299422834192bc52613161d2ee362b6464caa962

                                              • C:\Users\Admin\AppData\Local\Temp\1000013001\rig.exe
                                                Filesize

                                                2.5MB

                                                MD5

                                                4691a9fe21f8589b793ea16f0d1749f1

                                                SHA1

                                                5c297f97142b7dad1c2d0c6223346bf7bcf2ea82

                                                SHA256

                                                63733ff3b794ebd7566103c8a37f7de862348ffacf130661f2c544dea8cde904

                                                SHA512

                                                ee27d5912e2fb4b045ffd39689162ab2668a79615b2b641a17b6b03c4273070a711f9f29dd847ffff5ae437d9df6102df6e10e898c36d44ec25e64ba1dd83386

                                              • C:\Users\Admin\AppData\Local\Temp\1000020001\1.exe
                                                Filesize

                                                317KB

                                                MD5

                                                e1b59d2805b38262b9967bce3e719dbf

                                                SHA1

                                                4081416cfaa76941981c34518d45b60e8d4b2013

                                                SHA256

                                                d5bba713d11ebbb7a91be59dae0f2d4b818897fe756b854dfe40babe7664c173

                                                SHA512

                                                bcea30a8f2a10aed0e2c97133734a34a850c18ee9447966ed8cdae8bbf72b98ebd2703a7cadf53b8991ef5eb3047d871242e990a4b7baf00eda8ca5f5f7dda35

                                              • C:\Users\Admin\AppData\Local\Temp\1000023001\FirstZ.exe
                                                Filesize

                                                2.5MB

                                                MD5

                                                ffada57f998ed6a72b6ba2f072d2690a

                                                SHA1

                                                6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

                                                SHA256

                                                677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

                                                SHA512

                                                1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

                                              • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
                                                Filesize

                                                493KB

                                                MD5

                                                92c01627961859a84ffa633327c5d7f9

                                                SHA1

                                                5b406c39f81f67e2b2e263137c7059718e4af007

                                                SHA256

                                                92373c134cbf9fc4a98ed7c80f244c8655b3852d3a1f1983fc4a7b3a00bf1370

                                                SHA512

                                                f31f9d45d7783441866faa0e684412040dd74c2878adfc6e5a874626e291b3e3cae7746cb62e2388d4183e615d9b919178fa409f2e12b3d0cf478c59450d3439

                                              • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
                                                Filesize

                                                415KB

                                                MD5

                                                07101cac5b9477ba636cd8ca7b9932cb

                                                SHA1

                                                59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

                                                SHA256

                                                488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

                                                SHA512

                                                02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

                                              • C:\Users\Admin\AppData\Local\Temp\1000108001\ldr.exe
                                                Filesize

                                                415KB

                                                MD5

                                                c4aeaafc0507785736e000ff7e823f5e

                                                SHA1

                                                b1acdee835f02856985a822fe99921b097ed1519

                                                SHA256

                                                b1d5b1e480a5731caacc65609eaf069622f1129965819079aa09bc9d96dadde5

                                                SHA512

                                                fbaefbce3232481490bce7b859c6c1bafd87ee6d952a2be9bf7c4ed25fe8fc9aff46c2246e247aa05ce8e405831a5905ca366c5333ede0af48f9a6287479a12d

                                              • C:\Users\Admin\AppData\Local\Temp\1000109001\alex5555555.exe
                                                Filesize

                                                1.7MB

                                                MD5

                                                a80a86c701801cbd77cf7406be6d11f0

                                                SHA1

                                                ef98a953fae4506e0402de15c1f1d9f0bfb47b01

                                                SHA256

                                                2f25790b3368b6afd35007dfe873e90a288cfce9d19758756b71fa6952a675f2

                                                SHA512

                                                7e1216bda5c36efcc4146c410cb5717e0e9e8257c25cef2239d631fa6fb15ec953b5155b6c4b4f4f3ff661425d1b6e5b716c21711fc7ddd423e6fc009e363d97

                                              • C:\Users\Admin\AppData\Local\Temp\1000110001\123.exe
                                                Filesize

                                                297KB

                                                MD5

                                                cd581d68ed550455444ee6e099c44266

                                                SHA1

                                                f131d587578336651fd3e325b82b6c185a4b6429

                                                SHA256

                                                a2ebb4bbf2ae4f7755b3ab604996e6c7e570ac8837ca544854ed696a81972505

                                                SHA512

                                                33f94920032436cd45906c27cd5b39f47f9519ab5a1a6745bd8a69d81ce729d8e5e425a7538b5f4f6992bd3804e0376085f5da1c28cf9f4d664cabe64036d0b5

                                              • C:\Users\Admin\AppData\Local\Temp\1000111001\streamer.exe
                                                Filesize

                                                8.4MB

                                                MD5

                                                e75b157e639b54dbd603da6f5274ae7a

                                                SHA1

                                                42bf3073fc63234d2c3f5c937e7ddbd069e8ed4a

                                                SHA256

                                                a0a8fe7208a6065d64ae9c463d64498d1808279d3aa788fa98871bc4d33466cc

                                                SHA512

                                                68683e9a55662322fb5eb266dcff16f26ad2923ba4fe21892d552d2f2409e3aaa86cc6d91f8d26cefbb8f98f99e19d0f5340be3094449bfa7fcd56435692cd03

                                              • C:\Users\Admin\AppData\Local\Temp\1000112001\TpWWMUpe0LEV.exe
                                                Filesize

                                                1.2MB

                                                MD5

                                                242214131486132e33ceda794d66ca1f

                                                SHA1

                                                4ce34fd91f5c9e35b8694007b286635663ef9bf2

                                                SHA256

                                                bac402b5749b2da2211db6d2404c1c621ccd0c2e5d492eb6f973b3e2d38dd361

                                                SHA512

                                                031e0904d949cec515f2d6f2b5e4b9c0df03637787ff14f20c58e711c54eec77d1f22aa0cf0f6efd65362c1fc0066645d5d005c6a77fe5b169427cdd42555d29

                                              • C:\Users\Admin\AppData\Local\Temp\1000115001\build.exe
                                                Filesize

                                                10.7MB

                                                MD5

                                                6b1eb54b0153066ddbe5595a58e40536

                                                SHA1

                                                adf81c3104e5d62853fa82c2bd9b0a5becb4589a

                                                SHA256

                                                d39627a497bf5f7e89642ef14bb0134193bc12ad18a2eadddf305c4f8d69b0b8

                                                SHA512

                                                104faaa4085c9173274d4e0e468eaf75fb22c4cfe38226e4594e6aa0a1dcb148bde7e5e0756b664f14b680872d2476340ebd69fac883d8e99b20acfb5f5dbf04

                                              • C:\Users\Admin\AppData\Local\Temp\Cab787C.tmp
                                                Filesize

                                                70KB

                                                MD5

                                                49aebf8cbd62d92ac215b2923fb1b9f5

                                                SHA1

                                                1723be06719828dda65ad804298d0431f6aff976

                                                SHA256

                                                b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                SHA512

                                                bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                              • C:\Users\Admin\AppData\Local\Temp\Tar78BE.tmp
                                                Filesize

                                                181KB

                                                MD5

                                                4ea6026cf93ec6338144661bf1202cd1

                                                SHA1

                                                a1dec9044f750ad887935a01430bf49322fbdcb7

                                                SHA256

                                                8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                SHA512

                                                6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                              • C:\Users\Admin\AppData\Local\Temp\onefile_2324_133639709137694000\python310.dll
                                                Filesize

                                                4.3MB

                                                MD5

                                                c80b5cb43e5fe7948c3562c1fff1254e

                                                SHA1

                                                f73cb1fb9445c96ecd56b984a1822e502e71ab9d

                                                SHA256

                                                058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

                                                SHA512

                                                faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

                                              • C:\Users\Admin\AppData\Local\Temp\onefile_2324_133639709137694000\stub.exe
                                                Filesize

                                                18.0MB

                                                MD5

                                                f0587004f479243c18d0ccff0665d7f6

                                                SHA1

                                                b3014badadfffdd6be2931a77a9df4673750fee7

                                                SHA256

                                                8ce148c264ce50e64ab866e34759de81b816a3f54b21c3426513bed3f239649a

                                                SHA512

                                                6dedaa729ee93520907ce46054f0573fb887ac0890bea9d1d22382e9d05f8c14a8c151fe2061a0ec1dae791b13752e0fbc00ccc85838caa7524edba35d469434

                                              • C:\Windows\Tasks\Hkbsse.job
                                                Filesize

                                                266B

                                                MD5

                                                865ce951a7a87a5caca0d725aa3b8aec

                                                SHA1

                                                55b09ca8b899f3ae8006a13d94accaf65be20139

                                                SHA256

                                                c84620d16aec95f1e3639ada312ffce05e75ace61d879d152048671bdd271a09

                                                SHA512

                                                d47fbd367f2907ed2d9783005356c5846dc28ac8a94da150b35aafc71673511773ac707cce7c059848a87d522e7c3b5d488727e4c37cda7b11adabad7bd735c5

                                              • \Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
                                                Filesize

                                                1.9MB

                                                MD5

                                                f7b7a8eb191d45b9cf730d6fe78d36e1

                                                SHA1

                                                0b7a7220d686c904b0ea89b6e036fb21acf0f85b

                                                SHA256

                                                2379b88d09d15ee3b0e5a6cd83ac92086db55203aafa63149b1216b22ca4837c

                                                SHA512

                                                b282e77a5855c5b302139740dfc870eec9a358669b84a8a35ccbef6abc40c4182fb34cf24d17bd5012173e71b8d7c7ddecc834248a470e7e9cffc3cdd19a4b36

                                              • \Users\Admin\AppData\Roaming\d3d9.dll
                                                Filesize

                                                279KB

                                                MD5

                                                8fa26f1e37d3ff7f736fc93d520bc8ab

                                                SHA1

                                                ad532e1cb4a1b3cd82c7a85647f8f6dd99833bb1

                                                SHA256

                                                6c47da8fbd12f22d7272fbf223e054bf5093c0922d0e8fb7d6289a5913c2e45d

                                                SHA512

                                                8a0b53cbc3a20e2f0fd41c486b1af1fbbcf7f2fed9f7368b672a07f25faaa2568bbdbcf0841233ac8c473a4d1dee099e90bf6098a6fa15e44b8526efdafc1287

                                              • memory/820-762-0x0000000019970000-0x0000000019C52000-memory.dmp
                                                Filesize

                                                2.9MB

                                              • memory/820-763-0x0000000000E90000-0x0000000000E98000-memory.dmp
                                                Filesize

                                                32KB

                                              • memory/1040-836-0x000007FEF54F0000-0x000007FEF57A6000-memory.dmp
                                                Filesize

                                                2.7MB

                                              • memory/1040-835-0x000007FEF57B0000-0x000007FEF57E4000-memory.dmp
                                                Filesize

                                                208KB

                                              • memory/1040-828-0x000000013FA40000-0x000000013FB38000-memory.dmp
                                                Filesize

                                                992KB

                                              • memory/1548-767-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1548-768-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1548-764-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1548-765-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1548-766-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1548-782-0x00000000FF890000-0x00000000FF8E7000-memory.dmp
                                                Filesize

                                                348KB

                                              • memory/1548-771-0x0000000140000000-0x000000014000E000-memory.dmp
                                                Filesize

                                                56KB

                                              • memory/1572-644-0x0000000000400000-0x0000000000450000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/1572-642-0x0000000000400000-0x0000000000450000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/1572-645-0x0000000000400000-0x0000000000450000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/1772-675-0x00000000002E0000-0x0000000000412000-memory.dmp
                                                Filesize

                                                1.2MB

                                              • memory/2012-832-0x000007FEF7F30000-0x000007FEF7F48000-memory.dmp
                                                Filesize

                                                96KB

                                              • memory/2012-834-0x000007FEF6960000-0x000007FEF6971000-memory.dmp
                                                Filesize

                                                68KB

                                              • memory/2012-833-0x000007FEF6B10000-0x000007FEF6B27000-memory.dmp
                                                Filesize

                                                92KB

                                              • memory/2012-831-0x000007FEF54F0000-0x000007FEF57A6000-memory.dmp
                                                Filesize

                                                2.7MB

                                              • memory/2012-830-0x000007FEF57B0000-0x000007FEF57E4000-memory.dmp
                                                Filesize

                                                208KB

                                              • memory/2012-829-0x000000013FA40000-0x000000013FB38000-memory.dmp
                                                Filesize

                                                992KB

                                              • memory/2060-393-0x0000000000ED0000-0x0000000000F20000-memory.dmp
                                                Filesize

                                                320KB

                                              • memory/2088-332-0x0000000000400000-0x000000000236B000-memory.dmp
                                                Filesize

                                                31.4MB

                                              • memory/2140-412-0x00000000008D0000-0x0000000000956000-memory.dmp
                                                Filesize

                                                536KB

                                              • memory/2248-742-0x000000001AFF0000-0x000000001B2D2000-memory.dmp
                                                Filesize

                                                2.9MB

                                              • memory/2248-751-0x0000000002430000-0x0000000002438000-memory.dmp
                                                Filesize

                                                32KB

                                              • memory/2324-823-0x000000013F4D0000-0x000000013FFA8000-memory.dmp
                                                Filesize

                                                10.8MB

                                              • memory/2324-773-0x000000013F4D0000-0x000000013FFA8000-memory.dmp
                                                Filesize

                                                10.8MB

                                              • memory/2392-3-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-5-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-18-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-1-0x0000000077AB0000-0x0000000077AB2000-memory.dmp
                                                Filesize

                                                8KB

                                              • memory/2392-8-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-6-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-4-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-0-0x0000000001350000-0x0000000001821000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2392-2-0x0000000001351000-0x000000000137F000-memory.dmp
                                                Filesize

                                                184KB

                                              • memory/2444-824-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-783-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-786-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-825-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-787-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-784-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2444-785-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2524-20-0x0000000000851000-0x000000000087F000-memory.dmp
                                                Filesize

                                                184KB

                                              • memory/2524-706-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-358-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-252-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-253-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-394-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-243-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-242-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-772-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-342-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-241-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-174-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-23-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-827-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-826-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-696-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-646-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-21-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2524-19-0x0000000000850000-0x0000000000D21000-memory.dmp
                                                Filesize

                                                4.8MB

                                              • memory/2876-687-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-690-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-700-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-692-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-694-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-695-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-691-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-697-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-689-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-688-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-686-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-693-0x0000000000200000-0x0000000000220000-memory.dmp
                                                Filesize

                                                128KB

                                              • memory/2876-698-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2876-699-0x0000000140000000-0x0000000140848000-memory.dmp
                                                Filesize

                                                8.3MB

                                              • memory/2880-788-0x000000013F330000-0x000000014056E000-memory.dmp
                                                Filesize

                                                18.2MB

                                              • memory/2976-659-0x000000013F220000-0x000000013FB27000-memory.dmp
                                                Filesize

                                                9.0MB