Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    16/07/2020, 18:56

General

  • Target

    838111ab2eddfdd565bf1bd43c7af7c3.exe

  • Size

    703KB

  • MD5

    838111ab2eddfdd565bf1bd43c7af7c3

  • SHA1

    0c3959714516584b1890096d1bee6815b751c392

  • SHA256

    66251b30db7b4c7d47cfcea9872b37d789d3ff7591996b1ddac5ad85106bf381

  • SHA512

    7c53e746502ddebd8b01c96405c883cfe108786e195bfee554e20dedf96937d9356ecfd4b310e1b637fb52d41f402d37ee6e55885be06c4eee38a3163e1feb49

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of WriteProcessMemory 426 IoCs
  • Suspicious behavior: MapViewOfSection 110 IoCs
  • Suspicious use of SetThreadContext 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 50 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1446 IoCs
  • Executes dropped EXE 75 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Drops startup file 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SendNotifyMessage
    • Suspicious use of FindShellTrayWindow
    • Checks whether UAC is enabled
    PID:1324
    • C:\Users\Admin\AppData\Local\Temp\838111ab2eddfdd565bf1bd43c7af7c3.exe
      "C:\Users\Admin\AppData\Local\Temp\838111ab2eddfdd565bf1bd43c7af7c3.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      PID:1060
      • C:\Windows\SysWOW64\notepad.exe
        "C:\Windows\system32\notepad.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        • NTFS ADS
        • Loads dropped DLL
        • Drops startup file
        PID:1084
        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Executes dropped EXE
          PID:836
          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
            5⤵
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious behavior: EnumeratesProcesses
            • Executes dropped EXE
            PID:1432
          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1432 65224
            5⤵
            • Suspicious use of WriteProcessMemory
            • Suspicious behavior: EnumeratesProcesses
            • Executes dropped EXE
            PID:1496
            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Executes dropped EXE
              PID:644
              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                7⤵
                • Suspicious use of WriteProcessMemory
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious behavior: EnumeratesProcesses
                • Executes dropped EXE
                PID:532
                • C:\Windows\SysWOW64\explorer.exe
                  "C:\Windows\SysWOW64\explorer.exe"
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1392
              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 532 69202
                7⤵
                • Suspicious use of WriteProcessMemory
                • Suspicious behavior: EnumeratesProcesses
                • Executes dropped EXE
                PID:1048
                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of SetThreadContext
                  • Executes dropped EXE
                  PID:1260
                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                    9⤵
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of SetThreadContext
                    • Suspicious use of AdjustPrivilegeToken
                    • Executes dropped EXE
                    PID:1792
                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1792 82290
                    9⤵
                    • Suspicious use of WriteProcessMemory
                    • Executes dropped EXE
                    PID:1852
                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                      10⤵
                      • Suspicious use of WriteProcessMemory
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of SetThreadContext
                      • Executes dropped EXE
                      PID:1656
                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                        11⤵
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of SetThreadContext
                        • Suspicious use of AdjustPrivilegeToken
                        • Executes dropped EXE
                        PID:1576
                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1576 86908
                        11⤵
                        • Executes dropped EXE
                        PID:1920
                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                          12⤵
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of SetThreadContext
                          • Executes dropped EXE
                          PID:1940
                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                            13⤵
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of SetThreadContext
                            • Suspicious use of AdjustPrivilegeToken
                            • Executes dropped EXE
                            PID:1944
                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1944 90839
                            13⤵
                            • Executes dropped EXE
                            PID:1996
                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                              14⤵
                              • Suspicious behavior: MapViewOfSection
                              • Suspicious use of SetThreadContext
                              • Executes dropped EXE
                              PID:1040
                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                15⤵
                                • Suspicious behavior: MapViewOfSection
                                • Suspicious use of SetThreadContext
                                • Suspicious use of AdjustPrivilegeToken
                                • Executes dropped EXE
                                PID:1504
                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1504 94864
                                15⤵
                                • Executes dropped EXE
                                PID:1072
                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                  16⤵
                                  • Suspicious behavior: MapViewOfSection
                                  • Suspicious use of SetThreadContext
                                  • Executes dropped EXE
                                  PID:1424
                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                    17⤵
                                    • Suspicious behavior: MapViewOfSection
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Executes dropped EXE
                                    PID:1476
                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1476 104817
                                    17⤵
                                    • Executes dropped EXE
                                    PID:1632
                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                      18⤵
                                      • Suspicious behavior: MapViewOfSection
                                      • Suspicious use of SetThreadContext
                                      • Executes dropped EXE
                                      PID:656
                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                        19⤵
                                        • Suspicious behavior: MapViewOfSection
                                        • Suspicious use of SetThreadContext
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Executes dropped EXE
                                        PID:308
                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 308 108826
                                        19⤵
                                        • Executes dropped EXE
                                        PID:580
                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                          20⤵
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of SetThreadContext
                                          • Executes dropped EXE
                                          PID:1532
                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                            21⤵
                                            • Suspicious behavior: MapViewOfSection
                                            • Suspicious use of SetThreadContext
                                            • Suspicious use of AdjustPrivilegeToken
                                            • Executes dropped EXE
                                            PID:364
                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 364 118794
                                            21⤵
                                            • Executes dropped EXE
                                            PID:1048
                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                              22⤵
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of SetThreadContext
                                              • Executes dropped EXE
                                              PID:1660
                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                23⤵
                                                • Suspicious behavior: MapViewOfSection
                                                • Suspicious use of SetThreadContext
                                                • Suspicious use of AdjustPrivilegeToken
                                                • Executes dropped EXE
                                                PID:1600
                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1600 128841
                                                23⤵
                                                • Executes dropped EXE
                                                PID:1800
                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                  24⤵
                                                  • Suspicious behavior: MapViewOfSection
                                                  • Suspicious use of SetThreadContext
                                                  • Executes dropped EXE
                                                  PID:1868
                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                    25⤵
                                                    • Suspicious behavior: MapViewOfSection
                                                    • Suspicious use of SetThreadContext
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Executes dropped EXE
                                                    PID:1900
                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1900 138950
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:1952
                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                      26⤵
                                                      • Suspicious behavior: MapViewOfSection
                                                      • Suspicious use of SetThreadContext
                                                      • Executes dropped EXE
                                                      PID:1924
                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                        27⤵
                                                        • Suspicious behavior: MapViewOfSection
                                                        • Suspicious use of SetThreadContext
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Executes dropped EXE
                                                        PID:2020
                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 2020 142787
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:1064
                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                          28⤵
                                                          • Suspicious behavior: MapViewOfSection
                                                          • Suspicious use of SetThreadContext
                                                          • Executes dropped EXE
                                                          PID:1568
                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                            29⤵
                                                            • Suspicious behavior: MapViewOfSection
                                                            • Suspicious use of SetThreadContext
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            • Executes dropped EXE
                                                            PID:1308
                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1308 146765
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:1616
                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                              30⤵
                                                              • Suspicious behavior: MapViewOfSection
                                                              • Suspicious use of SetThreadContext
                                                              • Executes dropped EXE
                                                              PID:620
                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                31⤵
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Executes dropped EXE
                                                                PID:1764
                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1764 150728
                                                                31⤵
                                                                • Executes dropped EXE
                                                                PID:1392
                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                  32⤵
                                                                  • Suspicious use of SetThreadContext
                                                                  • Executes dropped EXE
                                                                  PID:1768
                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                    33⤵
                                                                    • Suspicious use of SetThreadContext
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    • Executes dropped EXE
                                                                    PID:1116
                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1116 160696
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:1844
                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                      34⤵
                                                                      • Suspicious use of SetThreadContext
                                                                      • Executes dropped EXE
                                                                      PID:1884
                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                        35⤵
                                                                        • Suspicious use of SetThreadContext
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        • Executes dropped EXE
                                                                        PID:1916
                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1916 170680
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        PID:2028
                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                          36⤵
                                                                          • Suspicious use of SetThreadContext
                                                                          • Executes dropped EXE
                                                                          PID:1492
                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                            37⤵
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            • Executes dropped EXE
                                                                            PID:1040
                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1040 174643
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            PID:1556
                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                              38⤵
                                                                              • Suspicious use of SetThreadContext
                                                                              • Executes dropped EXE
                                                                              PID:1436
                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                39⤵
                                                                                • Suspicious use of SetThreadContext
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                • Executes dropped EXE
                                                                                PID:1096
                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1096 178527
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                PID:1356
                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                  40⤵
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Executes dropped EXE
                                                                                  PID:1516
                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                    41⤵
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    • Executes dropped EXE
                                                                                    PID:1036
                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1036 182552
                                                                                    41⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:468
                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                      42⤵
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Executes dropped EXE
                                                                                      PID:1332
                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                        43⤵
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        • Executes dropped EXE
                                                                                        PID:1644
                                                                                      • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1644 192723
                                                                                        43⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1968
                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                          44⤵
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Executes dropped EXE
                                                                                          PID:2040
                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                            45⤵
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Executes dropped EXE
                                                                                            PID:1920
                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1920 196779
                                                                                            45⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2008
                                                                                            • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                              46⤵
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Executes dropped EXE
                                                                                              PID:1924
                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                47⤵
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1572
                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1572 200632
                                                                                                47⤵
                                                                                                  PID:1568
                                                                                                  • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                    48⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    PID:908
                                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                      49⤵
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1048
                                                                                                    • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                      "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1048 204345
                                                                                                      49⤵
                                                                                                        PID:1400
                                                                                                        • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                          "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                          50⤵
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          PID:1516
                                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                            51⤵
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1808
                                                                                                          • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1808 208401
                                                                                                            51⤵
                                                                                                              PID:1128
                                                                                                              • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                52⤵
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                PID:468
                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe"
                                                                                                                  53⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:1332
                                                                                                                • C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe
                                                                                                                  "C:\Users\Admin\AppData\Roaming\gdher\fgtdhg.exe" 2 1332 212286
                                                                                                                  53⤵
                                                                                                                    PID:1868
            • C:\Windows\SysWOW64\colorcpl.exe
              "C:\Windows\SysWOW64\colorcpl.exe"
              2⤵
              • Adds Run key to start application
              • Adds policy Run key to start application
              • Suspicious use of WriteProcessMemory
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious behavior: EnumeratesProcesses
              • Modifies Internet Explorer settings
              PID:888
              • C:\Program Files\Mozilla Firefox\Firefox.exe
                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                3⤵
                  PID:1648
              • C:\Windows\SysWOW64\cscript.exe
                "C:\Windows\SysWOW64\cscript.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1604
              • C:\Windows\SysWOW64\cmmon32.exe
                "C:\Windows\SysWOW64\cmmon32.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1908
              • C:\Windows\SysWOW64\systray.exe
                "C:\Windows\SysWOW64\systray.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1028
              • C:\Windows\SysWOW64\help.exe
                "C:\Windows\SysWOW64\help.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:612
              • C:\Windows\SysWOW64\mstsc.exe
                "C:\Windows\SysWOW64\mstsc.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1628
              • C:\Windows\SysWOW64\control.exe
                "C:\Windows\SysWOW64\control.exe"
                2⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:560
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:1796
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:1660
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:1836
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:1356
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1804
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:1488
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:1800
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:1856
                              • C:\Windows\SysWOW64\autoconv.exe
                                "C:\Windows\SysWOW64\autoconv.exe"
                                2⤵
                                  PID:1672
                                • C:\Windows\SysWOW64\autoconv.exe
                                  "C:\Windows\SysWOW64\autoconv.exe"
                                  2⤵
                                    PID:1644
                                  • C:\Windows\SysWOW64\autofmt.exe
                                    "C:\Windows\SysWOW64\autofmt.exe"
                                    2⤵
                                      PID:1872
                                    • C:\Windows\SysWOW64\autofmt.exe
                                      "C:\Windows\SysWOW64\autofmt.exe"
                                      2⤵
                                        PID:1664
                                      • C:\Windows\SysWOW64\autofmt.exe
                                        "C:\Windows\SysWOW64\autofmt.exe"
                                        2⤵
                                          PID:1876
                                        • C:\Windows\SysWOW64\autofmt.exe
                                          "C:\Windows\SysWOW64\autofmt.exe"
                                          2⤵
                                            PID:1596
                                          • C:\Windows\SysWOW64\autofmt.exe
                                            "C:\Windows\SysWOW64\autofmt.exe"
                                            2⤵
                                              PID:1912
                                            • C:\Windows\SysWOW64\autofmt.exe
                                              "C:\Windows\SysWOW64\autofmt.exe"
                                              2⤵
                                                PID:1964
                                              • C:\Windows\SysWOW64\autofmt.exe
                                                "C:\Windows\SysWOW64\autofmt.exe"
                                                2⤵
                                                  PID:1900
                                                • C:\Windows\SysWOW64\autofmt.exe
                                                  "C:\Windows\SysWOW64\autofmt.exe"
                                                  2⤵
                                                    PID:1968
                                                  • C:\Windows\SysWOW64\autofmt.exe
                                                    "C:\Windows\SysWOW64\autofmt.exe"
                                                    2⤵
                                                      PID:1904
                                                    • C:\Windows\SysWOW64\autofmt.exe
                                                      "C:\Windows\SysWOW64\autofmt.exe"
                                                      2⤵
                                                        PID:1920
                                                      • C:\Windows\SysWOW64\autofmt.exe
                                                        "C:\Windows\SysWOW64\autofmt.exe"
                                                        2⤵
                                                          PID:1956
                                                        • C:\Windows\SysWOW64\autofmt.exe
                                                          "C:\Windows\SysWOW64\autofmt.exe"
                                                          2⤵
                                                            PID:2040
                                                          • C:\Windows\SysWOW64\autofmt.exe
                                                            "C:\Windows\SysWOW64\autofmt.exe"
                                                            2⤵
                                                              PID:1928
                                                            • C:\Windows\SysWOW64\autofmt.exe
                                                              "C:\Windows\SysWOW64\autofmt.exe"
                                                              2⤵
                                                                PID:284
                                                              • C:\Windows\SysWOW64\autofmt.exe
                                                                "C:\Windows\SysWOW64\autofmt.exe"
                                                                2⤵
                                                                  PID:1972
                                                                • C:\Windows\SysWOW64\autofmt.exe
                                                                  "C:\Windows\SysWOW64\autofmt.exe"
                                                                  2⤵
                                                                    PID:452
                                                                  • C:\Windows\SysWOW64\autofmt.exe
                                                                    "C:\Windows\SysWOW64\autofmt.exe"
                                                                    2⤵
                                                                      PID:2028
                                                                    • C:\Windows\SysWOW64\autofmt.exe
                                                                      "C:\Windows\SysWOW64\autofmt.exe"
                                                                      2⤵
                                                                        PID:2020
                                                                      • C:\Windows\SysWOW64\autofmt.exe
                                                                        "C:\Windows\SysWOW64\autofmt.exe"
                                                                        2⤵
                                                                          PID:2000
                                                                        • C:\Windows\SysWOW64\autofmt.exe
                                                                          "C:\Windows\SysWOW64\autofmt.exe"
                                                                          2⤵
                                                                            PID:1996
                                                                          • C:\Windows\SysWOW64\autofmt.exe
                                                                            "C:\Windows\SysWOW64\autofmt.exe"
                                                                            2⤵
                                                                              PID:1572
                                                                            • C:\Windows\SysWOW64\autofmt.exe
                                                                              "C:\Windows\SysWOW64\autofmt.exe"
                                                                              2⤵
                                                                                PID:2024
                                                                              • C:\Windows\SysWOW64\autofmt.exe
                                                                                "C:\Windows\SysWOW64\autofmt.exe"
                                                                                2⤵
                                                                                  PID:1508
                                                                                • C:\Windows\SysWOW64\autofmt.exe
                                                                                  "C:\Windows\SysWOW64\autofmt.exe"
                                                                                  2⤵
                                                                                    PID:1212
                                                                                  • C:\Windows\SysWOW64\autoconv.exe
                                                                                    "C:\Windows\SysWOW64\autoconv.exe"
                                                                                    2⤵
                                                                                      PID:884
                                                                                    • C:\Windows\SysWOW64\autoconv.exe
                                                                                      "C:\Windows\SysWOW64\autoconv.exe"
                                                                                      2⤵
                                                                                        PID:1320
                                                                                      • C:\Windows\SysWOW64\autoconv.exe
                                                                                        "C:\Windows\SysWOW64\autoconv.exe"
                                                                                        2⤵
                                                                                          PID:1556
                                                                                        • C:\Windows\SysWOW64\autoconv.exe
                                                                                          "C:\Windows\SysWOW64\autoconv.exe"
                                                                                          2⤵
                                                                                            PID:1288
                                                                                          • C:\Windows\SysWOW64\autoconv.exe
                                                                                            "C:\Windows\SysWOW64\autoconv.exe"
                                                                                            2⤵
                                                                                              PID:1308
                                                                                            • C:\Windows\SysWOW64\autoconv.exe
                                                                                              "C:\Windows\SysWOW64\autoconv.exe"
                                                                                              2⤵
                                                                                                PID:1072
                                                                                              • C:\Windows\SysWOW64\autoconv.exe
                                                                                                "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                2⤵
                                                                                                  PID:1580
                                                                                                • C:\Windows\SysWOW64\autoconv.exe
                                                                                                  "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                  2⤵
                                                                                                    PID:292
                                                                                                  • C:\Windows\SysWOW64\autoconv.exe
                                                                                                    "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                    2⤵
                                                                                                      PID:836
                                                                                                    • C:\Windows\SysWOW64\autoconv.exe
                                                                                                      "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                      2⤵
                                                                                                        PID:1424
                                                                                                      • C:\Windows\SysWOW64\autoconv.exe
                                                                                                        "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                        2⤵
                                                                                                          PID:776
                                                                                                        • C:\Windows\SysWOW64\autoconv.exe
                                                                                                          "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                          2⤵
                                                                                                            PID:1436
                                                                                                          • C:\Windows\SysWOW64\chkdsk.exe
                                                                                                            "C:\Windows\SysWOW64\chkdsk.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            • Enumerates system info in registry
                                                                                                            PID:1164
                                                                                                          • C:\Windows\SysWOW64\help.exe
                                                                                                            "C:\Windows\SysWOW64\help.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1864
                                                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                                                            "C:\Windows\SysWOW64\svchost.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1928
                                                                                                          • C:\Windows\SysWOW64\chkdsk.exe
                                                                                                            "C:\Windows\SysWOW64\chkdsk.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            • Enumerates system info in registry
                                                                                                            PID:1212
                                                                                                          • C:\Windows\SysWOW64\wscript.exe
                                                                                                            "C:\Windows\SysWOW64\wscript.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:776
                                                                                                          • C:\Windows\SysWOW64\svchost.exe
                                                                                                            "C:\Windows\SysWOW64\svchost.exe"
                                                                                                            2⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1760
                                                                                                          • C:\Windows\SysWOW64\autoconv.exe
                                                                                                            "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                            2⤵
                                                                                                              PID:1636
                                                                                                            • C:\Windows\SysWOW64\autoconv.exe
                                                                                                              "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                              2⤵
                                                                                                                PID:1644
                                                                                                              • C:\Windows\SysWOW64\autoconv.exe
                                                                                                                "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                                2⤵
                                                                                                                  PID:1852
                                                                                                                • C:\Windows\SysWOW64\autoconv.exe
                                                                                                                  "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                                  2⤵
                                                                                                                    PID:1672
                                                                                                                  • C:\Windows\SysWOW64\autoconv.exe
                                                                                                                    "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                                    2⤵
                                                                                                                      PID:1964
                                                                                                                    • C:\Windows\SysWOW64\autoconv.exe
                                                                                                                      "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                                      2⤵
                                                                                                                        PID:1912
                                                                                                                      • C:\Windows\SysWOW64\autoconv.exe
                                                                                                                        "C:\Windows\SysWOW64\autoconv.exe"
                                                                                                                        2⤵
                                                                                                                          PID:1868
                                                                                                                        • C:\Windows\SysWOW64\systray.exe
                                                                                                                          "C:\Windows\SysWOW64\systray.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1448
                                                                                                                        • C:\Windows\SysWOW64\help.exe
                                                                                                                          "C:\Windows\SysWOW64\help.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1508
                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                          "C:\Windows\SysWOW64\rundll32.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:316
                                                                                                                        • C:\Windows\SysWOW64\wuapp.exe
                                                                                                                          "C:\Windows\SysWOW64\wuapp.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1148
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "C:\Windows\SysWOW64\cmd.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:788
                                                                                                                        • C:\Windows\SysWOW64\cmstp.exe
                                                                                                                          "C:\Windows\SysWOW64\cmstp.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1656
                                                                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                          "C:\Windows\SysWOW64\rundll32.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1408
                                                                                                                        • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                          "C:\Windows\SysWOW64\msiexec.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1424
                                                                                                                        • C:\Windows\SysWOW64\NAPSTAT.EXE
                                                                                                                          "C:\Windows\SysWOW64\NAPSTAT.EXE"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:1588
                                                                                                                        • C:\Windows\SysWOW64\chkdsk.exe
                                                                                                                          "C:\Windows\SysWOW64\chkdsk.exe"
                                                                                                                          2⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          • Enumerates system info in registry
                                                                                                                          PID:1132
                                                                                                                        • C:\Windows\SysWOW64\wscript.exe
                                                                                                                          "C:\Windows\SysWOW64\wscript.exe"
                                                                                                                          2⤵
                                                                                                                            PID:1956

                                                                                                                        Network

                                                                                                                              MITRE ATT&CK Enterprise v6

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • memory/316-174-0x0000000000E20000-0x0000000000E2E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                56KB

                                                                                                                              • memory/560-87-0x0000000000BB0000-0x0000000000BCF000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                124KB

                                                                                                                              • memory/612-65-0x0000000000D20000-0x0000000000D26000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                24KB

                                                                                                                              • memory/776-133-0x0000000000FE0000-0x0000000001006000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                152KB

                                                                                                                              • memory/788-191-0x000000004A8C0000-0x000000004A90C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                304KB

                                                                                                                              • memory/888-13-0x00000000009F0000-0x0000000000A08000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                96KB

                                                                                                                              • memory/888-42-0x00000000031B0000-0x000000000326C000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                752KB

                                                                                                                              • memory/888-21-0x0000000003080000-0x0000000003189000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/1028-55-0x0000000000E30000-0x0000000000E35000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                20KB

                                                                                                                              • memory/1084-1-0x0000000000090000-0x0000000000091000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                              • memory/1132-237-0x0000000000930000-0x0000000000937000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                28KB

                                                                                                                              • memory/1148-181-0x0000000000940000-0x000000000094B000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                44KB

                                                                                                                              • memory/1164-96-0x0000000000EA0000-0x0000000000EA7000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                28KB

                                                                                                                              • memory/1212-124-0x0000000000A60000-0x0000000000A67000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                28KB

                                                                                                                              • memory/1324-244-0x000000000A9F0000-0x000000000AAEB000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1004KB

                                                                                                                              • memory/1324-161-0x0000000009C30000-0x0000000009D39000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/1324-63-0x0000000007090000-0x0000000007178000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                928KB

                                                                                                                              • memory/1324-141-0x0000000009880000-0x000000000994E000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                824KB

                                                                                                                              • memory/1324-151-0x0000000009950000-0x0000000009A92000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.3MB

                                                                                                                              • memory/1324-104-0x0000000007A60000-0x0000000007B29000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                804KB

                                                                                                                              • memory/1324-22-0x0000000008890000-0x000000000898B000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1004KB

                                                                                                                              • memory/1324-189-0x000000000A110000-0x000000000A1FF000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                956KB

                                                                                                                              • memory/1392-25-0x0000000000EA0000-0x0000000001121000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                2.5MB

                                                                                                                              • memory/1408-209-0x00000000000F0000-0x00000000000FE000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                56KB

                                                                                                                              • memory/1424-220-0x00000000005F0000-0x0000000000604000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                80KB

                                                                                                                              • memory/1432-7-0x0000000000400000-0x000000000042D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                180KB

                                                                                                                              • memory/1448-153-0x00000000002A0000-0x00000000002A5000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                20KB

                                                                                                                              • memory/1508-163-0x0000000000FB0000-0x0000000000FB6000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                24KB

                                                                                                                              • memory/1588-227-0x0000000000400000-0x0000000000446000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                280KB

                                                                                                                              • memory/1604-34-0x0000000000550000-0x0000000000572000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                              • memory/1628-78-0x00000000002C0000-0x00000000003C4000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                1.0MB

                                                                                                                              • memory/1648-44-0x000000013F760000-0x000000013F7F3000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                588KB

                                                                                                                              • memory/1656-200-0x0000000000C80000-0x0000000000C98000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                96KB

                                                                                                                              • memory/1760-143-0x00000000005C0000-0x00000000005C8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                32KB

                                                                                                                              • memory/1864-106-0x0000000000350000-0x0000000000356000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                24KB

                                                                                                                              • memory/1908-46-0x0000000000420000-0x000000000042D000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                52KB

                                                                                                                              • memory/1928-115-0x00000000001E0000-0x00000000001E8000-memory.dmp

                                                                                                                                Filesize

                                                                                                                                32KB