Analysis
-
max time kernel
300s -
max time network
260s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
17-11-2022 04:46
Static task
static1
Behavioral task
behavioral1
Sample
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe
Resource
win7-20221111-en
General
-
Target
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe
-
Size
1.3MB
-
MD5
e924f93d838f03edd47759695b5ced49
-
SHA1
56fc3cdf00381bcf71fce9e3b7eecf07f53026b3
-
SHA256
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad
-
SHA512
685733352962065d13a0cf22233b3c162899eff70947569e18796925182c579e07c608defffa967b9b9e917d1526f91c5ab0c82170bbac37f0f0cbc31b73da18
-
SSDEEP
24576:lI9iDSZlHH3nDfaxT2sRhFjWP1kpWbF998XWVZDJ:lIcElXDAT2GhwjsWVBJ
Malware Config
Extracted
redline
333333
79.137.194.32:5050
-
auth_value
0e0de8ec7f9ca54eeaacd4905c5421c1
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4552-182-0x0000000000400000-0x0000000000428000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exedescription pid process target process PID 4324 created 2872 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe taskhostw.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 4684 svchost.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\svchost.exe upx C:\Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral2/memory/4684-289-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral2/memory/4684-436-0x0000000000400000-0x0000000000566000-memory.dmp upx behavioral2/memory/4684-447-0x0000000000400000-0x0000000000566000-memory.dmp upx -
Loads dropped DLL 3 IoCs
Processes:
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exesvchost.exepid process 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4684 svchost.exe 4684 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exedescription pid process target process PID 4324 set thread context of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe -
Drops file in Windows directory 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\2219095117.pri MicrosoftEdge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2020 timeout.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Discuz! MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 6eddb21148fad801 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-VersionLow = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\trust MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Root\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "268435456" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersio = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658B MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\FlipAheadCompletedVersion = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Rating Prompt Shown = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active\{8C0132E1-CC0F-4FF5-AE03-9BE77BE3FB7E} = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\JumpListFirstRun = "3" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "395205405" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\IETld\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\Favorites\Order = 0c0000000a000000000000000c0000000100000000000000 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\FirstRecoveryTime = 03bc80556daed801 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames\ MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\ChromeMigration\AllComplete = "1" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modify = 010000008e6d2498180e7d2d6018b9d95b35e3e6b62aba45ac666522bd5e43bc8b72bacc1743127883ad033b4edab4516b4485eace7c68ffdc192f29374b MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\Main MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\History\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\LowRegistry\DOMStorage MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ExtensionsStore\datastore\usage\dscc_inventory\ExtensionI = "5" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\DatabaseComplete = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exesvchost.exengentask.exepid process 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4684 svchost.exe 4552 ngentask.exe 4552 ngentask.exe 4684 svchost.exe 4684 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4956 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
ngentask.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 4552 ngentask.exe Token: SeDebugPrivilege 3928 MicrosoftEdge.exe Token: SeDebugPrivilege 3928 MicrosoftEdge.exe Token: SeDebugPrivilege 3928 MicrosoftEdge.exe Token: SeDebugPrivilege 3928 MicrosoftEdge.exe Token: SeDebugPrivilege 4704 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4704 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4704 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4704 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4668 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4668 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3928 MicrosoftEdge.exe 4956 MicrosoftEdgeCP.exe 4956 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exesvchost.execmd.exeMicrosoftEdgeCP.exedescription pid process target process PID 4324 wrote to memory of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe PID 4324 wrote to memory of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe PID 4324 wrote to memory of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe PID 4324 wrote to memory of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe PID 4324 wrote to memory of 4552 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe ngentask.exe PID 4324 wrote to memory of 4684 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe svchost.exe PID 4324 wrote to memory of 4684 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe svchost.exe PID 4324 wrote to memory of 4684 4324 872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe svchost.exe PID 4684 wrote to memory of 3336 4684 svchost.exe cmd.exe PID 4684 wrote to memory of 3336 4684 svchost.exe cmd.exe PID 4684 wrote to memory of 3336 4684 svchost.exe cmd.exe PID 3336 wrote to memory of 2020 3336 cmd.exe timeout.exe PID 3336 wrote to memory of 2020 3336 cmd.exe timeout.exe PID 3336 wrote to memory of 2020 3336 cmd.exe timeout.exe PID 4956 wrote to memory of 4704 4956 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4956 wrote to memory of 4704 4956 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4956 wrote to memory of 4704 4956 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4956 wrote to memory of 4704 4956 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe
Processes
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\Temp\svchost.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 64⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe"C:\Users\Admin\AppData\Local\Temp\872a5dee4be75a8677bf2d905227e43e706e3f87a008de30c16d5cd256730fad.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngentask.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD5c1da1c2ca9cfee6a91b5d0b9b071ce9f
SHA18460a1580866864b3b1065544cf095f6be850a12
SHA25614c1f77597304f40558b21e961fe839f296d1c72f2c5c6fe327e35b144523a18
SHA5129dddcf8e3b918bc9b22245ee1de52b7e5c48684d7bc5946c9e25215b21d7be25442b2fda0c9284cc3a3d56e8cc39a1d9a037b5b20b09679300e7ba4e75ad99bb
-
C:\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
1.1MB
MD5c1da1c2ca9cfee6a91b5d0b9b071ce9f
SHA18460a1580866864b3b1065544cf095f6be850a12
SHA25614c1f77597304f40558b21e961fe839f296d1c72f2c5c6fe327e35b144523a18
SHA5129dddcf8e3b918bc9b22245ee1de52b7e5c48684d7bc5946c9e25215b21d7be25442b2fda0c9284cc3a3d56e8cc39a1d9a037b5b20b09679300e7ba4e75ad99bb
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\Users\Admin\AppData\Local\Temp\advapi32.dllFilesize
428KB
MD5b15d63cc5b9b4f5f32585886b0e60629
SHA168192b9f211e60e12196f8f7e016cfce4d735af3
SHA256569d3524ee3967409e3712255d6c86ff3455cb80bc1f5c30b12faa8515612193
SHA51299207e98f1f791305951af0a32b7f85ef2262a33960f9f64dd1b04fbe19fe66f0a883d25079318ddb25df32370bfb68bc94682a8fb07e2f21477e2f48bb59439
-
memory/2020-459-0x0000000000000000-mapping.dmp
-
memory/3336-445-0x0000000000000000-mapping.dmp
-
memory/4324-168-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-148-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-127-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-128-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-130-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-129-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-131-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-132-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-134-0x0000000002530000-0x0000000002A97000-memory.dmpFilesize
5.4MB
-
memory/4324-136-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-137-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-138-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-139-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-140-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-141-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-173-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-142-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-144-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-145-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-146-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-147-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-172-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-149-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-150-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-152-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-151-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-154-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-155-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-153-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-156-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-157-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-171-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-159-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-160-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-161-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-162-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-163-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-164-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-165-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-166-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-167-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-118-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-169-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-170-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-158-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-126-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-143-0x0000000000AE0000-0x0000000000BFE000-memory.dmpFilesize
1.1MB
-
memory/4324-174-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-175-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-176-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-177-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-178-0x000000000DCC0000-0x000000000DE4A000-memory.dmpFilesize
1.5MB
-
memory/4324-179-0x000000000DCC0000-0x000000000DE4A000-memory.dmpFilesize
1.5MB
-
memory/4324-119-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-120-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-121-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-122-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-123-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-186-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-124-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-253-0x0000000002530000-0x0000000002A97000-memory.dmpFilesize
5.4MB
-
memory/4324-125-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4324-260-0x0000000000AE0000-0x0000000000BFE000-memory.dmpFilesize
1.1MB
-
memory/4552-441-0x0000000007710000-0x0000000007786000-memory.dmpFilesize
472KB
-
memory/4552-182-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4552-256-0x0000000005700000-0x0000000005712000-memory.dmpFilesize
72KB
-
memory/4552-264-0x00000000058E0000-0x000000000592B000-memory.dmpFilesize
300KB
-
memory/4552-393-0x00000000070B0000-0x0000000007272000-memory.dmpFilesize
1.8MB
-
memory/4552-252-0x0000000005C40000-0x0000000006246000-memory.dmpFilesize
6.0MB
-
memory/4552-185-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4552-367-0x0000000006610000-0x00000000066A2000-memory.dmpFilesize
584KB
-
memory/4552-368-0x0000000006BB0000-0x00000000070AE000-memory.dmpFilesize
5.0MB
-
memory/4552-183-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4552-443-0x0000000006B20000-0x0000000006B70000-memory.dmpFilesize
320KB
-
memory/4552-394-0x00000000077B0000-0x0000000007CDC000-memory.dmpFilesize
5.2MB
-
memory/4552-359-0x0000000005AA0000-0x0000000005B06000-memory.dmpFilesize
408KB
-
memory/4552-180-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4552-254-0x00000000057D0000-0x00000000058DA000-memory.dmpFilesize
1.0MB
-
memory/4552-259-0x0000000005760000-0x000000000579E000-memory.dmpFilesize
248KB
-
memory/4552-184-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4684-289-0x0000000000400000-0x0000000000566000-memory.dmpFilesize
1.4MB
-
memory/4684-357-0x00000000100C0000-0x0000000010410000-memory.dmpFilesize
3.3MB
-
memory/4684-435-0x0000000002600000-0x0000000002C10000-memory.dmpFilesize
6.1MB
-
memory/4684-436-0x0000000000400000-0x0000000000566000-memory.dmpFilesize
1.4MB
-
memory/4684-268-0x0000000000000000-mapping.dmp
-
memory/4684-336-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4684-334-0x0000000002F50000-0x0000000003083000-memory.dmpFilesize
1.2MB
-
memory/4684-447-0x0000000000400000-0x0000000000566000-memory.dmpFilesize
1.4MB
-
memory/4684-449-0x0000000002F50000-0x0000000003081000-memory.dmpFilesize
1.2MB
-
memory/4684-451-0x00000000776D0000-0x000000007785E000-memory.dmpFilesize
1.6MB
-
memory/4684-453-0x00000000100C0000-0x0000000010410000-memory.dmpFilesize
3.3MB
-
memory/4684-288-0x0000000002600000-0x0000000002C10000-memory.dmpFilesize
6.1MB