Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2023 16:13
Static task
static1
Behavioral task
behavioral1
Sample
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe
Resource
win10v2004-20230220-en
General
-
Target
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe
-
Size
2.8MB
-
MD5
688774feec1cc9685acaece804dc7a26
-
SHA1
68afac92caeb49c2bb96970138738844aa7b8f99
-
SHA256
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f
-
SHA512
68467b861e163b4b0ff7477c3c780eb3141ae069e8145431798576a1da74347b0da6fa0a0ad19defc3e0d29bdfb29240bffa12ef2d1904697a6e52f965da041a
-
SSDEEP
24576:oafQKgqtAyrUFdRZTbwcXE1Rw2qs9kpu2ny/v/LtGZsYjot0+iEzyLU/E5h8bV2:oNwcXFoaU/E5h8bKlsyKqiB8tFg
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Extracted
remcos
03162023
nikahuve.ac.ug:65213
kalskala.ac.ug:65213
tuekisaa.ac.ug:65213
parthaha.ac.ug:65213
-
audio_folder
MicRecords
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
revcs.exe
-
copy_folder
sdf
-
delete_file
true
-
hide_file
true
-
hide_keylog_file
true
-
install_flag
false
-
install_path
%AppData%
-
keylog_crypt
true
-
keylog_file
vgcqfxs.dat
-
keylog_flag
false
-
keylog_folder
fsscbas
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
fdvcmhjdf-Z4BK1G
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
Remvc
-
take_screenshot_option
false
-
take_screenshot_time
5
-
take_screenshot_title
notepad;solitaire;
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2688-168-0x00000000028F0000-0x000000000290C000-memory.dmp family_rhadamanthys behavioral1/memory/2688-170-0x00000000028F0000-0x000000000290C000-memory.dmp family_rhadamanthys behavioral1/memory/2688-172-0x0000000002A90000-0x0000000003A90000-memory.dmp family_rhadamanthys behavioral1/memory/2688-173-0x00000000028F0000-0x000000000290C000-memory.dmp family_rhadamanthys behavioral1/memory/2688-180-0x00000000028F0000-0x000000000290C000-memory.dmp family_rhadamanthys -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6498.tmp.exe5A16.tmp.exe5EF9.tmp.exea54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe5A16.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 6498.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 5A16.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 5EF9.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 5A16.tmp.exe -
Executes dropped EXE 9 IoCs
Processes:
5A16.tmp.exe5A16.tmp.exe5EF9.tmp.exe5A16.tmp.exe6498.tmp.exe5EF9.tmp.exe6498.tmp.exe5EF9.tmp.exe5EF9.tmp.exepid process 2056 5A16.tmp.exe 3384 5A16.tmp.exe 4984 5EF9.tmp.exe 5064 5A16.tmp.exe 1484 6498.tmp.exe 2856 5EF9.tmp.exe 4212 6498.tmp.exe 4184 5EF9.tmp.exe 2056 5EF9.tmp.exe -
Loads dropped DLL 4 IoCs
Processes:
5A16.tmp.exepid process 5064 5A16.tmp.exe 5064 5A16.tmp.exe 5064 5A16.tmp.exe 5064 5A16.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
6498.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Picxpsdvu = "\"C:\\Users\\Admin\\AppData\\Roaming\\Omsae\\Picxpsdvu.exe\"" 6498.tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exepid process 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe5A16.tmp.exe5EF9.tmp.exe6498.tmp.exe5EF9.tmp.exedescription pid process target process PID 840 set thread context of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 2056 set thread context of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 4984 set thread context of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 1484 set thread context of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 4184 set thread context of 2056 4184 5EF9.tmp.exe 5EF9.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dllhost.exe5A16.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5A16.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5A16.tmp.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5084 timeout.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
powershell.exea54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exedllhost.exe5A16.tmp.exe5A16.tmp.exepowershell.exepowershell.exepowershell.exe5EF9.tmp.exepid process 4496 powershell.exe 4496 powershell.exe 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe 4936 dllhost.exe 4936 dllhost.exe 4936 dllhost.exe 4936 dllhost.exe 2056 5A16.tmp.exe 2056 5A16.tmp.exe 5064 5A16.tmp.exe 5064 5A16.tmp.exe 3496 powershell.exe 3496 powershell.exe 2836 powershell.exe 2836 powershell.exe 2000 powershell.exe 2000 powershell.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe 2056 5EF9.tmp.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
powershell.exea54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe5A16.tmp.exe5EF9.tmp.exepowershell.exe6498.tmp.exepowershell.exe5EF9.tmp.exepowershell.exe5EF9.tmp.exe5EF9.tmp.exedescription pid process Token: SeDebugPrivilege 4496 powershell.exe Token: SeDebugPrivilege 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe Token: SeDebugPrivilege 2056 5A16.tmp.exe Token: SeDebugPrivilege 4984 5EF9.tmp.exe Token: SeDebugPrivilege 3496 powershell.exe Token: SeDebugPrivilege 1484 6498.tmp.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeDebugPrivilege 2856 5EF9.tmp.exe Token: SeDebugPrivilege 2000 powershell.exe Token: SeDebugPrivilege 4184 5EF9.tmp.exe Token: SeDebugPrivilege 2056 5EF9.tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
6498.tmp.exepid process 4212 6498.tmp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exea54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe5A16.tmp.exe5EF9.tmp.exe6498.tmp.exe5A16.tmp.execmd.execmd.exe5EF9.tmp.exe5EF9.tmp.exedescription pid process target process PID 840 wrote to memory of 4496 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe powershell.exe PID 840 wrote to memory of 4496 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe powershell.exe PID 840 wrote to memory of 4496 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe powershell.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 840 wrote to memory of 2688 840 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe PID 2688 wrote to memory of 4936 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe dllhost.exe PID 2688 wrote to memory of 4936 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe dllhost.exe PID 2688 wrote to memory of 4936 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe dllhost.exe PID 2688 wrote to memory of 4936 2688 a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe dllhost.exe PID 2056 wrote to memory of 3384 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 3384 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 3384 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 2056 wrote to memory of 5064 2056 5A16.tmp.exe 5A16.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 4984 wrote to memory of 2856 4984 5EF9.tmp.exe 5EF9.tmp.exe PID 1484 wrote to memory of 3496 1484 6498.tmp.exe powershell.exe PID 1484 wrote to memory of 3496 1484 6498.tmp.exe powershell.exe PID 1484 wrote to memory of 3496 1484 6498.tmp.exe powershell.exe PID 5064 wrote to memory of 4832 5064 5A16.tmp.exe cmd.exe PID 5064 wrote to memory of 4832 5064 5A16.tmp.exe cmd.exe PID 5064 wrote to memory of 4832 5064 5A16.tmp.exe cmd.exe PID 4832 wrote to memory of 5084 4832 cmd.exe timeout.exe PID 4832 wrote to memory of 5084 4832 cmd.exe timeout.exe PID 4832 wrote to memory of 5084 4832 cmd.exe timeout.exe PID 1484 wrote to memory of 2008 1484 6498.tmp.exe cmd.exe PID 1484 wrote to memory of 2008 1484 6498.tmp.exe cmd.exe PID 1484 wrote to memory of 2008 1484 6498.tmp.exe cmd.exe PID 2008 wrote to memory of 2836 2008 cmd.exe powershell.exe PID 2008 wrote to memory of 2836 2008 cmd.exe powershell.exe PID 2008 wrote to memory of 2836 2008 cmd.exe powershell.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 1484 wrote to memory of 4212 1484 6498.tmp.exe 6498.tmp.exe PID 2856 wrote to memory of 2000 2856 5EF9.tmp.exe powershell.exe PID 2856 wrote to memory of 2000 2856 5EF9.tmp.exe powershell.exe PID 4184 wrote to memory of 2056 4184 5EF9.tmp.exe 5EF9.tmp.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe"C:\Users\Admin\AppData\Local\Temp\a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exeC:\Users\Admin\AppData\Local\Temp\a54493e71a7f28fe61e607ba4c089ada71e13ff9e1df6cef5619a4163e2b0a1f.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"3⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exe"C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeC:\Users\Admin\AppData\Local\Temp\5A16.tmp.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeC:\Users\Admin\AppData\Local\Temp\5A16.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "5A16.tmp.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exe"C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exeC:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -Seconds 3; Set-MpPreference -ExclusionPath C:\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6498.tmp.exe"C:\Users\Admin\AppData\Local\Temp\6498.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6498.tmp.exeC:\Users\Admin\AppData\Local\Temp\6498.tmp.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Roaming\5EF9.tmp.exeC:\Users\Admin\AppData\Roaming\5EF9.tmp.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\5EF9.tmp.exeC:\Users\Admin\AppData\Roaming\5EF9.tmp.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\5EF9.tmp.exe.logFilesize
1KB
MD5cbe207895aa962105ca913568f7d2135
SHA1c62bcc9aac6f6ad0b14457d3d51c0a474528b106
SHA256bd468d112dd92eab9177b172cb46016d96c6d85fe567734852f8c07733c14a24
SHA5123a93a75b1c3a93d8466a7b2f5b0433805d7055e829834203b3b6ae48ecb899f3aaf68610057a0ce0f9a29647cd7c6577dcb4c89124dc368e91f5866a5dbf1e44
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5e84d53c4ec8a232cacf460cf821021b0
SHA1d4d48f9f11877836e581f4bbbd0c45bd9289ed34
SHA25654c854eb1385fcde550e6b85cff8fcef30fa548099aeffb45b8250ad1187b974
SHA51299472bb10e956f2233f8357bf9a7432274a9d27552fbf64f59c907a86b5dc6e30b56ad86aad9a2573dd81b70ba49ecb3ff05c5188a39a39137a7a5df74c382fe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD578e4808faeb81836623f0fe7241a9f9a
SHA1b8982a98352b98652fb3244267d98bcde67c49b3
SHA256e9f03ae8684ed815829413a08dd212ab27850814362f5a8e99cb4e0bfa0ef77f
SHA512020a2358e4a274fb08be83cd1723b845f76d8c6630c54313bc7b63d71b3a1645c072d7238ca8a54cd6d48a042f8815e9b98533cf8f89c5551aacfe3381a2102a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5ff018dc74f7c82f8dbc5f365dbc8df61
SHA11abf816f6f893d2cfbe258f56a65c06c53db8ac5
SHA2562c3110653a70dd0f4bb85ed053025110dfd1eaae292c5f9e0e06efc1e6656c5f
SHA512b87b152e67074d804165d96862fcae4c8f910eb5afd1f1e693eb47b562db9acb940746890884cc5df2679a5daf7ad4c06eaff9ad659e16208bffedc5396aa808
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\5A16.tmp.exeFilesize
2.8MB
MD5938817d3e634cfb8a9d3ac2840f76863
SHA1271f98e2096ca0f269b619a50063dd0683e73654
SHA256e7ab444923133b71a9c88f388e6a53a592c8e065a8fd79ce2b4568da0a471cc7
SHA512cfba6ed98b6091709c0ec15924afad8e82c38a26f274e14e3b5eb5f83a53c432b83dc2e8a5db141487cc372f4b6468dde5a7fd00de9cdc90c7fb8c4d7207580d
-
C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Local\Temp\6498.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\6498.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\6498.tmp.exeFilesize
3.1MB
MD5520a5d096ab0c9095aac940617c5acf6
SHA1d76821fb07ee23971a105f9427d5e7d005c8c720
SHA2560fd2e8f4ce5b3c6f3ecf206683da7e3474781c3f6edf4c384f9af4805e65e6dd
SHA5122b580385b02d2adc0058ec25ef1c3520493f3812111e36515e0069ea26e40182e619539db909f4baa8ec40cc7cd5e904536c52d575f5ba77d578ea6cf7f2b596
-
C:\Users\Admin\AppData\Local\Temp\75B26A6E\mozglue.dllFilesize
135KB
MD59e682f1eb98a9d41468fc3e50f907635
SHA185e0ceca36f657ddf6547aa0744f0855a27527ee
SHA256830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d
SHA512230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed
-
C:\Users\Admin\AppData\Local\Temp\75B26A6E\msvcp140.dllFilesize
429KB
MD5109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\Local\Temp\75B26A6E\nss3.dllFilesize
1.2MB
MD5556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2
-
C:\Users\Admin\AppData\Local\Temp\75B26A6E\vcruntime140.dllFilesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gqs3mtix.m0y.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Roaming\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
C:\Users\Admin\AppData\Roaming\5EF9.tmp.exeFilesize
3.6MB
MD520d27d8d88014215720e53218998dc59
SHA1392a43d9a4ac4feb0731552d3bb4cbc5801bb862
SHA256a81da88f6e47eeb58b864d01b09ed273421ab6e1b9b3c5f763f47a913b5b2ff3
SHA512579ccc664bdee663bc1ca05a3b7fb4fd7ff65d58b669159450a5787cff7c09e3a8bf70b9f2ce1fa594b7e920b474473168c7e7a13293b8f7d7625aec0f3af439
-
memory/840-155-0x0000000005C00000-0x0000000005C10000-memory.dmpFilesize
64KB
-
memory/840-134-0x0000000005EA0000-0x0000000005EC2000-memory.dmpFilesize
136KB
-
memory/840-135-0x0000000005C00000-0x0000000005C10000-memory.dmpFilesize
64KB
-
memory/840-133-0x0000000000EC0000-0x000000000118A000-memory.dmpFilesize
2.8MB
-
memory/1484-260-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/1484-203-0x0000000000530000-0x000000000084A000-memory.dmpFilesize
3.1MB
-
memory/1484-1673-0x0000000005010000-0x0000000005020000-memory.dmpFilesize
64KB
-
memory/2000-3006-0x000001BC75960000-0x000001BC75968000-memory.dmpFilesize
32KB
-
memory/2000-3000-0x000001BC75950000-0x000001BC7595A000-memory.dmpFilesize
40KB
-
memory/2000-2989-0x000001BC75930000-0x000001BC7594C000-memory.dmpFilesize
112KB
-
memory/2000-2579-0x000001BC73F00000-0x000001BC73F10000-memory.dmpFilesize
64KB
-
memory/2000-2578-0x000001BC73F00000-0x000001BC73F10000-memory.dmpFilesize
64KB
-
memory/2056-2640-0x0000020BA4AC0000-0x0000020BA4AD0000-memory.dmpFilesize
64KB
-
memory/2056-188-0x0000000000BA0000-0x0000000000E72000-memory.dmpFilesize
2.8MB
-
memory/2688-172-0x0000000002A90000-0x0000000003A90000-memory.dmpFilesize
16.0MB
-
memory/2688-166-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-175-0x0000000002D80000-0x0000000002D82000-memory.dmpFilesize
8KB
-
memory/2688-161-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-173-0x00000000028F0000-0x000000000290C000-memory.dmpFilesize
112KB
-
memory/2688-168-0x00000000028F0000-0x000000000290C000-memory.dmpFilesize
112KB
-
memory/2688-165-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-180-0x00000000028F0000-0x000000000290C000-memory.dmpFilesize
112KB
-
memory/2688-179-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-162-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-164-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/2688-170-0x00000000028F0000-0x000000000290C000-memory.dmpFilesize
112KB
-
memory/2688-169-0x0000000000E40000-0x0000000000E42000-memory.dmpFilesize
8KB
-
memory/2836-2557-0x0000000006FB0000-0x0000000006FB8000-memory.dmpFilesize
32KB
-
memory/2836-2535-0x0000000002430000-0x0000000002440000-memory.dmpFilesize
64KB
-
memory/2836-2536-0x0000000002430000-0x0000000002440000-memory.dmpFilesize
64KB
-
memory/2836-2537-0x0000000006C10000-0x0000000006C42000-memory.dmpFilesize
200KB
-
memory/2836-2538-0x0000000074430000-0x000000007447C000-memory.dmpFilesize
304KB
-
memory/2836-2548-0x0000000006BF0000-0x0000000006C0E000-memory.dmpFilesize
120KB
-
memory/2836-2549-0x000000007F110000-0x000000007F120000-memory.dmpFilesize
64KB
-
memory/2836-2550-0x0000000002430000-0x0000000002440000-memory.dmpFilesize
64KB
-
memory/2836-2551-0x0000000006E00000-0x0000000006E0A000-memory.dmpFilesize
40KB
-
memory/2836-2552-0x0000000007010000-0x00000000070A6000-memory.dmpFilesize
600KB
-
memory/2836-2554-0x0000000006F70000-0x0000000006F7E000-memory.dmpFilesize
56KB
-
memory/2836-2556-0x0000000006FC0000-0x0000000006FDA000-memory.dmpFilesize
104KB
-
memory/2856-378-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-364-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-271-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-273-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-281-0x0000021F54060000-0x0000021F54070000-memory.dmpFilesize
64KB
-
memory/2856-280-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-1860-0x0000021F54060000-0x0000021F54070000-memory.dmpFilesize
64KB
-
memory/2856-306-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-269-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-339-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-268-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-342-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-344-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-380-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-347-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-349-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-351-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-353-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-355-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-357-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-263-0x0000000000400000-0x00000000004A6000-memory.dmpFilesize
664KB
-
memory/2856-359-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-362-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-376-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-366-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-368-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-370-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-372-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/2856-374-0x0000021F53F80000-0x0000021F54058000-memory.dmpFilesize
864KB
-
memory/3496-1864-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/3496-338-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/3496-335-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/3496-1862-0x0000000004E20000-0x0000000004E30000-memory.dmpFilesize
64KB
-
memory/4184-2577-0x000001A279EA0000-0x000001A279EB0000-memory.dmpFilesize
64KB
-
memory/4212-2562-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/4212-2534-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/4496-138-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4496-157-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4496-140-0x0000000005A10000-0x0000000005A76000-memory.dmpFilesize
408KB
-
memory/4496-139-0x0000000005270000-0x0000000005898000-memory.dmpFilesize
6.2MB
-
memory/4496-146-0x0000000005A80000-0x0000000005AE6000-memory.dmpFilesize
408KB
-
memory/4496-151-0x00000000060D0000-0x00000000060EE000-memory.dmpFilesize
120KB
-
memory/4496-136-0x0000000002AF0000-0x0000000002B26000-memory.dmpFilesize
216KB
-
memory/4496-152-0x0000000007970000-0x0000000007FEA000-memory.dmpFilesize
6.5MB
-
memory/4496-153-0x00000000065F0000-0x000000000660A000-memory.dmpFilesize
104KB
-
memory/4496-154-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4496-137-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4496-156-0x0000000002C10000-0x0000000002C20000-memory.dmpFilesize
64KB
-
memory/4936-465-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-183-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-176-0x00000170ADD20000-0x00000170ADD27000-memory.dmpFilesize
28KB
-
memory/4936-177-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-178-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-181-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-182-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4936-174-0x00000170ADC00000-0x00000170ADC01000-memory.dmpFilesize
4KB
-
memory/4936-184-0x00007FF480A30000-0x00007FF480B2A000-memory.dmpFilesize
1000KB
-
memory/4984-198-0x0000026AAC7B0000-0x0000026AACB48000-memory.dmpFilesize
3.6MB
-
memory/4984-204-0x0000026AAE8D0000-0x0000026AAE8F2000-memory.dmpFilesize
136KB
-
memory/4984-247-0x0000026AAE8C0000-0x0000026AAE8D0000-memory.dmpFilesize
64KB
-
memory/5064-191-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5064-197-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5064-200-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/5064-345-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB