Analysis
-
max time kernel
36s -
max time network
51s -
platform
windows10-1703_x64 -
resource
win10-20220901-es -
resource tags
arch:x64arch:x86image:win10-20220901-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
28-01-2023 08:13
Behavioral task
behavioral1
Sample
Belle Delphine Nudes Leaked!/Anal.scr
Resource
win10-20220901-es
Behavioral task
behavioral2
Sample
Belle Delphine Nudes Leaked!/Big Dildo Riding.scr
Resource
win10-20220812-es
Behavioral task
behavioral3
Sample
Belle Delphine Nudes Leaked!/Titty Drop.scr
Resource
win10-20220812-es
General
-
Target
Belle Delphine Nudes Leaked!/Anal.scr
-
Size
3.4MB
-
MD5
ed6ea767354e940d79e591d21d8e1bbd
-
SHA1
d07011f13100f7578506f45630cfdb73286a3e44
-
SHA256
be790ab14ba841b5a5ae4fb7853924f33be7577b35a5565ca31fcd399b1ad8f8
-
SHA512
b653626e2d42d76d6daa48ecf779e053ab3bff1781c54519fe70f47bd97a03fcce3eed5dacb01edbae655b588ad4be138b2df29e604ddfd2cc0ff4f80b8da569
-
SSDEEP
49152:EbA37QXuXj2m0oENBxCFk+M0/V5Z7dTMjPvxQp0VR4NOjtSskvRIaqiZd:EbXXuiyENBE209BqnOmeMjYsqR7d
Malware Config
Signatures
-
DcRat 22 IoCs
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
Processes:
schtasks.exeschtasks.exeschtasks.exeAnal.scrschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 2964 schtasks.exe 4784 schtasks.exe 3900 schtasks.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings Anal.scr 5036 schtasks.exe 2772 schtasks.exe 4140 schtasks.exe 2192 schtasks.exe 3460 schtasks.exe 4904 schtasks.exe 4936 schtasks.exe 4724 schtasks.exe 3628 schtasks.exe 4568 schtasks.exe 1364 schtasks.exe 4992 schtasks.exe 1412 schtasks.exe 2428 schtasks.exe 2392 schtasks.exe 4960 schtasks.exe 2856 schtasks.exe 4588 schtasks.exe -
Modifies WinLogon for persistence 2 TTPs 7 IoCs
Processes:
webbroker.exewebbroker.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\", \"C:\\odt\\lsass.exe\", \"C:\\Users\\Public\\Desktop\\winlogon.exe\", \"C:\\Users\\Admin\\Searches\\System.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\", \"C:\\odt\\lsass.exe\", \"C:\\Users\\Public\\Desktop\\winlogon.exe\", \"C:\\Users\\Admin\\Searches\\System.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\", \"C:\\odt\\lsass.exe\", \"C:\\Users\\Public\\Desktop\\winlogon.exe\", \"C:\\Users\\Admin\\Searches\\System.exe\", \"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\", \"C:\\Windows\\Setup\\State\\taskhostw.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\", \"C:\\odt\\lsass.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\odt\\ShellExperienceHost.exe\", \"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\", \"C:\\odt\\lsass.exe\", \"C:\\Users\\Public\\Desktop\\winlogon.exe\"" webbroker.exe -
Process spawned unexpected child process 21 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4960 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4992 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5036 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4904 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4724 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1412 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2772 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2964 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4140 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2428 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4784 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3628 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2856 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4568 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3900 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2192 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4588 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2392 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1364 3076 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3460 3076 schtasks.exe -
Processes:
resource yara_rule C:\SurrogateagentsavesDll\webbroker.exe dcrat C:\SurrogateagentsavesDll\webbroker.exe dcrat behavioral1/memory/3644-286-0x0000000000B90000-0x0000000000E32000-memory.dmp dcrat C:\SurrogateagentsavesDll\webbroker.exe dcrat C:\Program Files (x86)\Windows Mail\fontdrvhost.exe dcrat C:\Program Files (x86)\Windows Mail\fontdrvhost.exe dcrat -
Executes dropped EXE 3 IoCs
Processes:
webbroker.exewebbroker.exefontdrvhost.exepid process 3644 webbroker.exe 3624 webbroker.exe 4432 fontdrvhost.exe -
Adds Run key to start application 2 TTPs 14 IoCs
Processes:
webbroker.exewebbroker.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Users\\Public\\Desktop\\winlogon.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\Setup\\State\\taskhostw.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\odt\\lsass.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Users\\Public\\Desktop\\winlogon.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Admin\\Searches\\System.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Users\\Admin\\Searches\\System.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\taskhostw = "\"C:\\Windows\\Setup\\State\\taskhostw.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\odt\\lsass.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\odt\\ShellExperienceHost.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fontdrvhost = "\"C:\\Program Files (x86)\\Windows Mail\\fontdrvhost.exe\"" webbroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\ShellExperienceHost = "\"C:\\odt\\ShellExperienceHost.exe\"" webbroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RuntimeBroker = "\"C:\\Windows\\PLA\\System\\RuntimeBroker.exe\"" webbroker.exe -
Drops file in Program Files directory 2 IoCs
Processes:
webbroker.exedescription ioc process File created C:\Program Files (x86)\Windows Mail\fontdrvhost.exe webbroker.exe File created C:\Program Files (x86)\Windows Mail\5b884080fd4f94 webbroker.exe -
Drops file in Windows directory 4 IoCs
Processes:
webbroker.exewebbroker.exedescription ioc process File created C:\Windows\PLA\System\RuntimeBroker.exe webbroker.exe File created C:\Windows\PLA\System\9e8d7a4ca61bd9 webbroker.exe File created C:\Windows\Setup\State\taskhostw.exe webbroker.exe File created C:\Windows\Setup\State\ea9f0e6c9e2dcd webbroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 21 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 5036 schtasks.exe 3900 schtasks.exe 2192 schtasks.exe 4960 schtasks.exe 4936 schtasks.exe 4140 schtasks.exe 2392 schtasks.exe 1364 schtasks.exe 3460 schtasks.exe 4904 schtasks.exe 2772 schtasks.exe 2428 schtasks.exe 2856 schtasks.exe 4568 schtasks.exe 4992 schtasks.exe 4724 schtasks.exe 1412 schtasks.exe 2964 schtasks.exe 4784 schtasks.exe 3628 schtasks.exe 4588 schtasks.exe -
Modifies registry class 4 IoCs
Processes:
fontdrvhost.exeAnal.scrwebbroker.exewebbroker.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings fontdrvhost.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings Anal.scr Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings webbroker.exe Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings webbroker.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
webbroker.exepowershell.exepowershell.exepowershell.exewebbroker.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exefontdrvhost.exepid process 3644 webbroker.exe 3528 powershell.exe 3744 powershell.exe 3996 powershell.exe 3996 powershell.exe 3528 powershell.exe 3744 powershell.exe 3996 powershell.exe 3528 powershell.exe 3744 powershell.exe 3624 webbroker.exe 3624 webbroker.exe 3624 webbroker.exe 3624 webbroker.exe 3624 webbroker.exe 4232 powershell.exe 4288 powershell.exe 4256 powershell.exe 3192 powershell.exe 2160 powershell.exe 1836 powershell.exe 3192 powershell.exe 4256 powershell.exe 3192 powershell.exe 4232 powershell.exe 4288 powershell.exe 2160 powershell.exe 1836 powershell.exe 4256 powershell.exe 4232 powershell.exe 4288 powershell.exe 2160 powershell.exe 1836 powershell.exe 4432 fontdrvhost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
webbroker.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3644 webbroker.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeIncreaseQuotaPrivilege 3996 powershell.exe Token: SeSecurityPrivilege 3996 powershell.exe Token: SeTakeOwnershipPrivilege 3996 powershell.exe Token: SeLoadDriverPrivilege 3996 powershell.exe Token: SeSystemProfilePrivilege 3996 powershell.exe Token: SeSystemtimePrivilege 3996 powershell.exe Token: SeProfSingleProcessPrivilege 3996 powershell.exe Token: SeIncBasePriorityPrivilege 3996 powershell.exe Token: SeCreatePagefilePrivilege 3996 powershell.exe Token: SeBackupPrivilege 3996 powershell.exe Token: SeRestorePrivilege 3996 powershell.exe Token: SeShutdownPrivilege 3996 powershell.exe Token: SeDebugPrivilege 3996 powershell.exe Token: SeSystemEnvironmentPrivilege 3996 powershell.exe Token: SeRemoteShutdownPrivilege 3996 powershell.exe Token: SeUndockPrivilege 3996 powershell.exe Token: SeManageVolumePrivilege 3996 powershell.exe Token: 33 3996 powershell.exe Token: 34 3996 powershell.exe Token: 35 3996 powershell.exe Token: 36 3996 powershell.exe Token: SeIncreaseQuotaPrivilege 3528 powershell.exe Token: SeSecurityPrivilege 3528 powershell.exe Token: SeTakeOwnershipPrivilege 3528 powershell.exe Token: SeLoadDriverPrivilege 3528 powershell.exe Token: SeSystemProfilePrivilege 3528 powershell.exe Token: SeSystemtimePrivilege 3528 powershell.exe Token: SeProfSingleProcessPrivilege 3528 powershell.exe Token: SeIncBasePriorityPrivilege 3528 powershell.exe Token: SeCreatePagefilePrivilege 3528 powershell.exe Token: SeBackupPrivilege 3528 powershell.exe Token: SeRestorePrivilege 3528 powershell.exe Token: SeShutdownPrivilege 3528 powershell.exe Token: SeDebugPrivilege 3528 powershell.exe Token: SeSystemEnvironmentPrivilege 3528 powershell.exe Token: SeRemoteShutdownPrivilege 3528 powershell.exe Token: SeUndockPrivilege 3528 powershell.exe Token: SeManageVolumePrivilege 3528 powershell.exe Token: 33 3528 powershell.exe Token: 34 3528 powershell.exe Token: 35 3528 powershell.exe Token: 36 3528 powershell.exe Token: SeIncreaseQuotaPrivilege 3744 powershell.exe Token: SeSecurityPrivilege 3744 powershell.exe Token: SeTakeOwnershipPrivilege 3744 powershell.exe Token: SeLoadDriverPrivilege 3744 powershell.exe Token: SeSystemProfilePrivilege 3744 powershell.exe Token: SeSystemtimePrivilege 3744 powershell.exe Token: SeProfSingleProcessPrivilege 3744 powershell.exe Token: SeIncBasePriorityPrivilege 3744 powershell.exe Token: SeCreatePagefilePrivilege 3744 powershell.exe Token: SeBackupPrivilege 3744 powershell.exe Token: SeRestorePrivilege 3744 powershell.exe Token: SeShutdownPrivilege 3744 powershell.exe Token: SeDebugPrivilege 3744 powershell.exe Token: SeSystemEnvironmentPrivilege 3744 powershell.exe Token: SeRemoteShutdownPrivilege 3744 powershell.exe Token: SeUndockPrivilege 3744 powershell.exe Token: SeManageVolumePrivilege 3744 powershell.exe Token: 33 3744 powershell.exe -
Suspicious use of WriteProcessMemory 42 IoCs
Processes:
Anal.scrWScript.execmd.exewebbroker.execmd.exewebbroker.execmd.exefontdrvhost.exedescription pid process target process PID 2588 wrote to memory of 2684 2588 Anal.scr WScript.exe PID 2588 wrote to memory of 2684 2588 Anal.scr WScript.exe PID 2588 wrote to memory of 2684 2588 Anal.scr WScript.exe PID 2684 wrote to memory of 4544 2684 WScript.exe cmd.exe PID 2684 wrote to memory of 4544 2684 WScript.exe cmd.exe PID 2684 wrote to memory of 4544 2684 WScript.exe cmd.exe PID 4544 wrote to memory of 3644 4544 cmd.exe webbroker.exe PID 4544 wrote to memory of 3644 4544 cmd.exe webbroker.exe PID 3644 wrote to memory of 3528 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 3528 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 3744 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 3744 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 3996 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 3996 3644 webbroker.exe powershell.exe PID 3644 wrote to memory of 824 3644 webbroker.exe cmd.exe PID 3644 wrote to memory of 824 3644 webbroker.exe cmd.exe PID 824 wrote to memory of 5004 824 cmd.exe w32tm.exe PID 824 wrote to memory of 5004 824 cmd.exe w32tm.exe PID 824 wrote to memory of 3624 824 cmd.exe webbroker.exe PID 824 wrote to memory of 3624 824 cmd.exe webbroker.exe PID 3624 wrote to memory of 4232 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4232 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4288 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4288 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4256 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4256 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 2160 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 2160 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 3192 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 3192 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 1836 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 1836 3624 webbroker.exe powershell.exe PID 3624 wrote to memory of 4024 3624 webbroker.exe cmd.exe PID 3624 wrote to memory of 4024 3624 webbroker.exe cmd.exe PID 4024 wrote to memory of 3848 4024 cmd.exe w32tm.exe PID 4024 wrote to memory of 3848 4024 cmd.exe w32tm.exe PID 4024 wrote to memory of 4432 4024 cmd.exe fontdrvhost.exe PID 4024 wrote to memory of 4432 4024 cmd.exe fontdrvhost.exe PID 4432 wrote to memory of 4876 4432 fontdrvhost.exe WScript.exe PID 4432 wrote to memory of 4876 4432 fontdrvhost.exe WScript.exe PID 4432 wrote to memory of 1900 4432 fontdrvhost.exe WScript.exe PID 4432 wrote to memory of 1900 4432 fontdrvhost.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Belle Delphine Nudes Leaked!\Anal.scr"C:\Users\Admin\AppData\Local\Temp\Belle Delphine Nudes Leaked!\Anal.scr" /S1⤵
- DcRat
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\SurrogateagentsavesDll\rh7k9gt.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\SurrogateagentsavesDll\2nvHsNHUhqkINTDaJO.bat" "3⤵
- Suspicious use of WriteProcessMemory
-
C:\SurrogateagentsavesDll\webbroker.exe"C:\SurrogateagentsavesDll\webbroker.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\SurrogateagentsavesDll\webbroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PLA\System\RuntimeBroker.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\ShellExperienceHost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\u3sYTpaNrj.bat"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\SurrogateagentsavesDll\webbroker.exe"C:\SurrogateagentsavesDll\webbroker.exe"6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\SurrogateagentsavesDll\webbroker.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\odt\lsass.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Searches\System.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Desktop\winlogon.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Setup\State\taskhostw.exe'7⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bWJ08PThl7.bat"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\Program Files (x86)\Windows Mail\fontdrvhost.exe"C:\Program Files (x86)\Windows Mail\fontdrvhost.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\81a24248-d4dc-42a1-adbd-324718c80131.vbs"9⤵
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3fab18bd-2373-4892-8a8a-e83cad55836f.vbs"9⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 8 /tr "'C:\odt\ShellExperienceHost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\odt\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ShellExperienceHostS" /sc MINUTE /mo 13 /tr "'C:\odt\ShellExperienceHost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Windows\PLA\System\RuntimeBroker.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\PLA\System\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\Windows\PLA\System\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 9 /tr "'C:\odt\lsass.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 13 /tr "'C:\odt\lsass.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 10 /tr "'C:\Users\Public\Desktop\winlogon.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Public\Desktop\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Public\Desktop\winlogon.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Searches\System.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Admin\Searches\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Searches\System.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Mail\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\State\taskhostw.exe'" /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostw" /sc ONLOGON /tr "'C:\Windows\Setup\State\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "taskhostwt" /sc MINUTE /mo 14 /tr "'C:\Windows\Setup\State\taskhostw.exe'" /rl HIGHEST /f1⤵
- DcRat
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Mail\fontdrvhost.exeFilesize
2.6MB
MD5b1364fea5ff9a5f9d5e4f63374b926fc
SHA1a837da0330a19c84bd2aaef52125f9cf98dc6f95
SHA256cf3dc60ee782af378f4ad7651deb5ac6229c9073e47973f0732a761fa06fc5ce
SHA512bb71608ebdb9a15ad0bc46226f3d0354bcd8659e088b723a29bb77e128ffe4bdfdb7bec859f3a8b9552efd31561088778655da3f1cc2137eec8707535bb21ecf
-
C:\Program Files (x86)\Windows Mail\fontdrvhost.exeFilesize
2.6MB
MD5b1364fea5ff9a5f9d5e4f63374b926fc
SHA1a837da0330a19c84bd2aaef52125f9cf98dc6f95
SHA256cf3dc60ee782af378f4ad7651deb5ac6229c9073e47973f0732a761fa06fc5ce
SHA512bb71608ebdb9a15ad0bc46226f3d0354bcd8659e088b723a29bb77e128ffe4bdfdb7bec859f3a8b9552efd31561088778655da3f1cc2137eec8707535bb21ecf
-
C:\SurrogateagentsavesDll\2nvHsNHUhqkINTDaJO.batFilesize
41B
MD5d9fbba17a660eee76f5e6556e7f00ccc
SHA15e40c6de4f9a1d2dae42a33902120af6c561f631
SHA256bed8275c849c71818fa90791dd5b71514a46a82990a7e04a3092dc7c761d1f62
SHA512c3f484fbe0b3461335b6aa6fe8ec509044e853edf15a514e3d2d33bd5370d9566b21f03cc0e949ec9a6a91c2abeb7f30dc741b33522548b75c056384f1344955
-
C:\SurrogateagentsavesDll\rh7k9gt.vbeFilesize
217B
MD5243fd9d2bb97513854d1025a6727a5e4
SHA1ab45973af5a26c54821b6897043958ecbf5683b3
SHA25638a0c3d04ec79e01ecc452d0afb95ac1f419472d9abbd9ebde4b30b94da6509b
SHA512da630c8c29ba43e8929ec89ba525930cceca5f580d338ca8337dc1be9cb41fe11ba7c7f4ab658407552b7d5ce2929fd56f86739bd76124e35a0110d407c6faeb
-
C:\SurrogateagentsavesDll\webbroker.exeFilesize
2.6MB
MD5b1364fea5ff9a5f9d5e4f63374b926fc
SHA1a837da0330a19c84bd2aaef52125f9cf98dc6f95
SHA256cf3dc60ee782af378f4ad7651deb5ac6229c9073e47973f0732a761fa06fc5ce
SHA512bb71608ebdb9a15ad0bc46226f3d0354bcd8659e088b723a29bb77e128ffe4bdfdb7bec859f3a8b9552efd31561088778655da3f1cc2137eec8707535bb21ecf
-
C:\SurrogateagentsavesDll\webbroker.exeFilesize
2.6MB
MD5b1364fea5ff9a5f9d5e4f63374b926fc
SHA1a837da0330a19c84bd2aaef52125f9cf98dc6f95
SHA256cf3dc60ee782af378f4ad7651deb5ac6229c9073e47973f0732a761fa06fc5ce
SHA512bb71608ebdb9a15ad0bc46226f3d0354bcd8659e088b723a29bb77e128ffe4bdfdb7bec859f3a8b9552efd31561088778655da3f1cc2137eec8707535bb21ecf
-
C:\SurrogateagentsavesDll\webbroker.exeFilesize
2.6MB
MD5b1364fea5ff9a5f9d5e4f63374b926fc
SHA1a837da0330a19c84bd2aaef52125f9cf98dc6f95
SHA256cf3dc60ee782af378f4ad7651deb5ac6229c9073e47973f0732a761fa06fc5ce
SHA512bb71608ebdb9a15ad0bc46226f3d0354bcd8659e088b723a29bb77e128ffe4bdfdb7bec859f3a8b9552efd31561088778655da3f1cc2137eec8707535bb21ecf
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
3KB
MD5ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\webbroker.exe.logFilesize
1KB
MD5430a3e587f99c7640a58a042ce63bdd6
SHA15d11d6b74e56cf622796971b8f57f57ca37592db
SHA256a087c10187c77ec487d0dcce45d36d5b1ff44f063aba489a17937f041de70bf7
SHA5120b2422fceade7f32cabf29cbb658663ec6f05c977435f66d1bd80c99ae0043e0d95f1bfafa4ec4fe84bc77a1a3b45bf38e84ce8737a6cf2b25bad4e37af0797d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD551c357e69e676468d780be08a12d5558
SHA1abf5b0a474d201158163dab5b654a16d8af26d53
SHA256beb645e34365633e3dd67082070bc7b59ace6e9341acf9ce579aaa0d7c8dfe7a
SHA512f31e6b910dff8a78932b75b1570eb0aed7caea39f269325d7362ea4edffe89281164ff6fbfdbd3bf7e0f2cbe4cf9217f54a1bd474140d8ddba67ddba1b48a198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD551c357e69e676468d780be08a12d5558
SHA1abf5b0a474d201158163dab5b654a16d8af26d53
SHA256beb645e34365633e3dd67082070bc7b59ace6e9341acf9ce579aaa0d7c8dfe7a
SHA512f31e6b910dff8a78932b75b1570eb0aed7caea39f269325d7362ea4edffe89281164ff6fbfdbd3bf7e0f2cbe4cf9217f54a1bd474140d8ddba67ddba1b48a198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD551c357e69e676468d780be08a12d5558
SHA1abf5b0a474d201158163dab5b654a16d8af26d53
SHA256beb645e34365633e3dd67082070bc7b59ace6e9341acf9ce579aaa0d7c8dfe7a
SHA512f31e6b910dff8a78932b75b1570eb0aed7caea39f269325d7362ea4edffe89281164ff6fbfdbd3bf7e0f2cbe4cf9217f54a1bd474140d8ddba67ddba1b48a198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5c80a0422405af45a924822942faa5352
SHA14f010c56c817731b3b46b227cd67f590e064a3eb
SHA256c74333f7ffb6081e164cf17f5d3008d9b29655aed344b0acad9281426fedceb9
SHA51289bf298dd1832e5a6e3de91a3d63b199e323ebeff5c7a6ff83039b3ed5429717cc780d69ab7b9e5f4cc26b4e7f540fa40eb1472b145ee4a0645d2346c757566b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD566bd72625953ad3e8d6d063659e84213
SHA1e25b5cc7b2f8f9fdd30f84434f6346be42e596aa
SHA2564ab0c0c3511e0550f66783fcfadf8b0b60fe166fda704d39d174341caef6af5a
SHA5125b405e52ea03171f5e79518a723b933d688cfc3d5ddf202b3476c29a346e745aa4f23d0fc41c2d592f7619f920c71876adf902ca8c86ae8f96c3e9304b81cfe0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD56e2e856051122acbef99e8dd1eae01bf
SHA16f710610132a0bd7f9dc1c0704db13cc4b1e6334
SHA2566ced23eda6ded97c674db5b7007ae55307a59ce44d854e5b2204ba401837c3cf
SHA5128897535db656c2bec47408802d505735e3c5f667170167050166792f1933c3751fb011cc48cb04b5f8891917aaee6400451dd024e6b46037aaa62462282e597f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD548d9a869735b653124a35a5d836249aa
SHA12f4c62398ef849a3a25b26cb361d4080830d106c
SHA2561f1ab50b38999cc8999eacf9966820478944144d52dfbd31171adaca792f12d4
SHA5125c163aa153d123609801747ea5a310d6b7142bda6fdbb7303d1512dbd105b17e444016d2f1ab511d9e8de7c212452a6bda8c9972319ce08f5db65b8654727081
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5fbfe3d33dba03884926d70894397a1be
SHA1baf0b7a4cbc3675af2d468207fcc435ddf7a60b3
SHA2568921756c2c2c956aed5c990c066eadd76a76d8c4d175db5caca38c3319ef529c
SHA51267b6023a97d1589bfbd9eafe2e8d80bff681e466c4475aeed9725af737b9157d0ba947394a71bc5975721056cbb7390ad3d455edb68db374050b7f017c810c3d
-
C:\Users\Admin\AppData\Local\Temp\3fab18bd-2373-4892-8a8a-e83cad55836f.vbsFilesize
503B
MD5483d34d735cd0842d2782796d964c99f
SHA1aa933196c8917aadb9fd2c469a302cc29d6ad34a
SHA256e6be1c83d046752ffb1f7c8b2455f648604db7acbf874518b2d6163a81f36979
SHA5124de3247ec8bc287e753e45fa6aa622126a71c999578d37174b18f96a1d18eab7721d8947ec6a40e515c6283308108b2aa02be2a58053f3a84d77fd92c30098e0
-
C:\Users\Admin\AppData\Local\Temp\81a24248-d4dc-42a1-adbd-324718c80131.vbsFilesize
727B
MD5cb138bf1552308a006b58bf9a8cd7184
SHA17b1df606147da790bb65094157e59b4c97a8ed14
SHA256c5d4fb3035a776c503243b8146760507b7b8a2c49da2e5d2af7165aa454768dc
SHA5120f28abb9ea2641f05543f5883fa2c2e41d7ab6c078baefa04b23df461ba9b6b9e1ab33ec8e9c8c677017f724c9c29ef7b4bc6afad7094a7bef8028da6b927e3c
-
C:\Users\Admin\AppData\Local\Temp\bWJ08PThl7.batFilesize
216B
MD521a736b73e06817ae338088c11fc3b91
SHA1d9623aa4409111c9cdbda78eaa75c87cb0168c35
SHA256b92ce015cfa2bd09a04ae1041feac911d11b24672218072414590307deae2a22
SHA512ecd15cd419139006c7b51de7015abcc433e10b062101f2a6fa45206b3ab10acec32fc3bd0e45ea864d43c3cb1916cff8cfd96cbffee359d8d447805a7d615f2f
-
C:\Users\Admin\AppData\Local\Temp\u3sYTpaNrj.batFilesize
204B
MD5524358fae7e97c761291ab50d396c972
SHA105a2b3301639ac6c0813dfbba94c043c704291e9
SHA2568b1d0967061a4b439aef639059ec3df847cc52ef6fbfbff0e0a6f107c2fa5337
SHA51244875e0e61be5b8d57d5ca33e24eba5894040777ecae0a8b59ff2122d9970aaba85059cc118b1e4f928dca1b2000a535a173db6350198795090de9455b7c5342
-
memory/824-316-0x0000000000000000-mapping.dmp
-
memory/1836-426-0x0000000000000000-mapping.dmp
-
memory/1900-639-0x0000000000000000-mapping.dmp
-
memory/2160-424-0x0000000000000000-mapping.dmp
-
memory/2588-181-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-134-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-152-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-154-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-155-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-156-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-151-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-133-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-132-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-128-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-158-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-160-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-163-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-162-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-161-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-164-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-159-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-157-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-165-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-166-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-167-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-168-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-169-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-171-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-172-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-174-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-173-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-170-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-175-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-176-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-178-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-177-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-179-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-180-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-145-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-183-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-144-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-182-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-120-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-136-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-150-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-146-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-121-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-122-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-149-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-148-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-123-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-126-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-125-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-129-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-130-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-131-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-147-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-135-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-137-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-138-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-143-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-140-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-141-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-153-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-139-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2588-142-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2684-186-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2684-185-0x00000000779B0000-0x0000000077B3E000-memory.dmpFilesize
1.6MB
-
memory/2684-184-0x0000000000000000-mapping.dmp
-
memory/3192-425-0x0000000000000000-mapping.dmp
-
memory/3528-301-0x0000000000000000-mapping.dmp
-
memory/3528-402-0x000001D524EB0000-0x000001D524ECE000-memory.dmpFilesize
120KB
-
memory/3528-317-0x000001D524F20000-0x000001D524FA2000-memory.dmpFilesize
520KB
-
memory/3528-318-0x000001D50B0D0000-0x000001D50B0E0000-memory.dmpFilesize
64KB
-
memory/3624-418-0x0000000002510000-0x0000000002522000-memory.dmpFilesize
72KB
-
memory/3624-415-0x0000000000000000-mapping.dmp
-
memory/3624-420-0x000000001B0E0000-0x000000001B0F2000-memory.dmpFilesize
72KB
-
memory/3624-419-0x000000001B090000-0x000000001B0E6000-memory.dmpFilesize
344KB
-
memory/3644-296-0x0000000001600000-0x000000000160A000-memory.dmpFilesize
40KB
-
memory/3644-290-0x0000000001610000-0x0000000001626000-memory.dmpFilesize
88KB
-
memory/3644-295-0x000000001C920000-0x000000001CE46000-memory.dmpFilesize
5.1MB
-
memory/3644-286-0x0000000000B90000-0x0000000000E32000-memory.dmpFilesize
2.6MB
-
memory/3644-300-0x000000001BA10000-0x000000001BA1C000-memory.dmpFilesize
48KB
-
memory/3644-299-0x0000000002F20000-0x0000000002F2A000-memory.dmpFilesize
40KB
-
memory/3644-294-0x00000000015D0000-0x00000000015E2000-memory.dmpFilesize
72KB
-
memory/3644-287-0x000000001BF40000-0x000000001C042000-memory.dmpFilesize
1.0MB
-
memory/3644-288-0x0000000001350000-0x000000000136C000-memory.dmpFilesize
112KB
-
memory/3644-289-0x000000001C1A0000-0x000000001C1F0000-memory.dmpFilesize
320KB
-
memory/3644-298-0x0000000002F00000-0x0000000002F0C000-memory.dmpFilesize
48KB
-
memory/3644-291-0x0000000001380000-0x0000000001392000-memory.dmpFilesize
72KB
-
memory/3644-297-0x0000000001630000-0x000000000163E000-memory.dmpFilesize
56KB
-
memory/3644-292-0x0000000002F10000-0x0000000002F20000-memory.dmpFilesize
64KB
-
memory/3644-293-0x000000001C150000-0x000000001C1A6000-memory.dmpFilesize
344KB
-
memory/3644-283-0x0000000000000000-mapping.dmp
-
memory/3744-319-0x0000025074970000-0x0000025074992000-memory.dmpFilesize
136KB
-
memory/3744-302-0x0000000000000000-mapping.dmp
-
memory/3848-458-0x0000000000000000-mapping.dmp
-
memory/3996-337-0x000001C646770000-0x000001C6467BA000-memory.dmpFilesize
296KB
-
memory/3996-322-0x000001C6465F0000-0x000001C646666000-memory.dmpFilesize
472KB
-
memory/3996-303-0x0000000000000000-mapping.dmp
-
memory/4024-441-0x0000000000000000-mapping.dmp
-
memory/4232-421-0x0000000000000000-mapping.dmp
-
memory/4256-423-0x0000000000000000-mapping.dmp
-
memory/4288-422-0x0000000000000000-mapping.dmp
-
memory/4432-642-0x000000001C620000-0x000000001C660000-memory.dmpFilesize
256KB
-
memory/4432-637-0x000000001BCF0000-0x000000001BD02000-memory.dmpFilesize
72KB
-
memory/4432-621-0x0000000000000000-mapping.dmp
-
memory/4544-260-0x0000000000000000-mapping.dmp
-
memory/4876-638-0x0000000000000000-mapping.dmp
-
memory/5004-325-0x0000000000000000-mapping.dmp