Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 15:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://beachwood.ug/ghjkl.exe
Resource
win10v2004-20230220-en
General
-
Target
http://beachwood.ug/ghjkl.exe
Malware Config
Extracted
azorult
http://195.245.112.115/index.php
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Detect rhadamanthys stealer shellcode 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1796-200-0x0000000000DE0000-0x0000000000DFC000-memory.dmp family_rhadamanthys behavioral1/memory/1796-202-0x0000000000DE0000-0x0000000000DFC000-memory.dmp family_rhadamanthys behavioral1/memory/1796-204-0x0000000000DE0000-0x0000000000DFC000-memory.dmp family_rhadamanthys behavioral1/memory/1796-205-0x0000000002A60000-0x0000000003A60000-memory.dmp family_rhadamanthys behavioral1/memory/1796-212-0x0000000000DE0000-0x0000000000DFC000-memory.dmp family_rhadamanthys -
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
ModiLoader Second Stage 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1912-224-0x0000000003CF0000-0x0000000003D1C000-memory.dmp modiloader_stage2 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ghjkl.exe6CBF.tmp.exe74C0.tmp.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation ghjkl.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 6CBF.tmp.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation 74C0.tmp.exe -
Executes dropped EXE 8 IoCs
Processes:
ghjkl.exeghjkl.exeghjkl.exe6CBF.tmp.exe6F60.tmp.exe74C0.tmp.exe6CBF.tmp.exe74C0.tmp.exepid process 1012 ghjkl.exe 1712 ghjkl.exe 1796 ghjkl.exe 1784 6CBF.tmp.exe 1912 6F60.tmp.exe 1928 74C0.tmp.exe 3284 6CBF.tmp.exe 1092 74C0.tmp.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook dllhost.exe Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook dllhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
ghjkl.exepid process 1796 ghjkl.exe 1796 ghjkl.exe 1796 ghjkl.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ghjkl.exe6CBF.tmp.exe74C0.tmp.exedescription pid process target process PID 1012 set thread context of 1796 1012 ghjkl.exe ghjkl.exe PID 1784 set thread context of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1928 set thread context of 1092 1928 74C0.tmp.exe 74C0.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dllhost.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = 402aab7ba945d901 iexplore.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{333EF9D6-C98D-11ED-8FFF-DE61172DF127} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010d3bb75b0ea114e9ca1233a5a090b7b00000000020000000000106600000001000020000000e1cd6ac90f623911e9c33bc2770999aa78201716da341bd5cc1d5721cdb2ece9000000000e8000000002000020000000bb7b3cfaf5e985724bbd58337c5d5c60b866a53139cb9a4d463e614c4905dcb02000000066daa4b3e490a297dbb0631cd4855e4070ff0c19a0f1049cd8d367eaf7ac77dd40000000753b0a823bb9584d6af3ef3b73e7b95ecbecd2debe3d9fca9f0342282b1e56a79e53d22e1cf5ecdb5679c83f94452927664fbf5bac2c3649d698050fc3adffee iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000010d3bb75b0ea114e9ca1233a5a090b7b00000000020000000000106600000001000020000000c2b61a401eec2c45aa9a1bb63f2779f23d4bd9d2315092d8953ec02f9094eed4000000000e80000000020000200000008e87934f6619757404f024d35096620cea3caec8381836bea12bfbbc134d9ac7200000006f4e4734d0abeed52744517c87306fb3e949ed7f885ee66a4435cc7dfba5f06d40000000ff16ec249bc608550a5d81edee680c100c00f20acc1bec597306a1ba71b6e345a395f460730d232d8079cd6377b69cd0d307df5624a8327a3d00a9ff3cb5f2db iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "138115857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "138115857" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = c0d60f099a5dd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{10916718-F697-4295-844E-1A0B445EE59A}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31022490" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31022490" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0bd1b099a5dd901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "386349356" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exeghjkl.exeghjkl.exedllhost.exepowershell.exepowershell.exepowershell.exepid process 2176 powershell.exe 2176 powershell.exe 2176 powershell.exe 1012 ghjkl.exe 1012 ghjkl.exe 1796 ghjkl.exe 1796 ghjkl.exe 3948 dllhost.exe 3948 dllhost.exe 3948 dllhost.exe 3948 dllhost.exe 4536 powershell.exe 4536 powershell.exe 3888 powershell.exe 3888 powershell.exe 3888 powershell.exe 3824 powershell.exe 3824 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exeghjkl.exepowershell.exepowershell.exe6CBF.tmp.exe74C0.tmp.exepowershell.exedescription pid process Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 1012 ghjkl.exe Token: SeDebugPrivilege 4536 powershell.exe Token: SeDebugPrivilege 3888 powershell.exe Token: SeDebugPrivilege 1784 6CBF.tmp.exe Token: SeDebugPrivilege 1928 74C0.tmp.exe Token: SeDebugPrivilege 3824 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
iexplore.exepid process 736 iexplore.exe 736 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 736 iexplore.exe 736 iexplore.exe 3416 IEXPLORE.EXE 3416 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
iexplore.exeghjkl.exeghjkl.exe6CBF.tmp.exe74C0.tmp.execmd.exedescription pid process target process PID 736 wrote to memory of 3416 736 iexplore.exe IEXPLORE.EXE PID 736 wrote to memory of 3416 736 iexplore.exe IEXPLORE.EXE PID 736 wrote to memory of 3416 736 iexplore.exe IEXPLORE.EXE PID 736 wrote to memory of 1012 736 iexplore.exe ghjkl.exe PID 736 wrote to memory of 1012 736 iexplore.exe ghjkl.exe PID 736 wrote to memory of 1012 736 iexplore.exe ghjkl.exe PID 1012 wrote to memory of 2176 1012 ghjkl.exe powershell.exe PID 1012 wrote to memory of 2176 1012 ghjkl.exe powershell.exe PID 1012 wrote to memory of 2176 1012 ghjkl.exe powershell.exe PID 1012 wrote to memory of 1712 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1712 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1712 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1012 wrote to memory of 1796 1012 ghjkl.exe ghjkl.exe PID 1796 wrote to memory of 3948 1796 ghjkl.exe dllhost.exe PID 1796 wrote to memory of 3948 1796 ghjkl.exe dllhost.exe PID 1796 wrote to memory of 3948 1796 ghjkl.exe dllhost.exe PID 1796 wrote to memory of 3948 1796 ghjkl.exe dllhost.exe PID 1784 wrote to memory of 4536 1784 6CBF.tmp.exe powershell.exe PID 1784 wrote to memory of 4536 1784 6CBF.tmp.exe powershell.exe PID 1784 wrote to memory of 4536 1784 6CBF.tmp.exe powershell.exe PID 1928 wrote to memory of 3888 1928 74C0.tmp.exe powershell.exe PID 1928 wrote to memory of 3888 1928 74C0.tmp.exe powershell.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1784 wrote to memory of 3284 1784 6CBF.tmp.exe 6CBF.tmp.exe PID 1928 wrote to memory of 820 1928 74C0.tmp.exe cmd.exe PID 1928 wrote to memory of 820 1928 74C0.tmp.exe cmd.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 1928 wrote to memory of 1092 1928 74C0.tmp.exe 74C0.tmp.exe PID 820 wrote to memory of 3824 820 cmd.exe powershell.exe PID 820 wrote to memory of 3824 820 cmd.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
outlook_office_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook dllhost.exe -
outlook_win_path 1 IoCs
Processes:
dllhost.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook dllhost.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://beachwood.ug/ghjkl.exe1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:736 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exe"C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exeC:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\dllhost.exe"C:\Windows\system32\dllhost.exe"4⤵
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exe"C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exeC:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\6F60.tmp.exe"C:\Users\Admin\AppData\Local\Temp\6F60.tmp.exe"1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exe"C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ENC cwBlAHQALQBtAHAAcAByAGUAZgBlAHIAZQBuAGMAZQAgAC0AZQB4AGMAbAB1AHMAaQBvAG4AcABhAHQAaAAgAEMAOgBcAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exeC:\Users\Admin\AppData\Local\Temp\74C0.tmp.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\74C0.tmp.exe.logFilesize
1KB
MD5235b41624578f64a6c072de2ef1541d8
SHA1e88702535e990b24f5aadadfe9bf799ab693cef7
SHA2568d61b54193d0a69e21ed33b2114372d27320a379139aee3d8b5077255bbe17ff
SHA5125453ab5a05c19d3ac00162c32898c628f64b3b77326fdc8b4cdb6e7dfb15a26e51654efb6add6d6b345da4e3727d6ba9c9ce9e134c747445b6ebb81e32edb440
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
1KB
MD54280e36a29fa31c01e4d8b2ba726a0d8
SHA1c485c2c9ce0a99747b18d899b71dfa9a64dabe32
SHA256e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359
SHA512494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\39K1WZBJ\ghjkl.exe.vwcclgc.partialFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\ghjkl[1].exeFilesize
2.8MB
MD50da8ff86305920cfdb0ab123d45ffa9d
SHA1aa31cd0743a25e2f7b4f4f0a217553afdb8e2678
SHA25660289bfd6a3a67726074cccced70f113419fea3b76c00855fb7dc5fa332d3f7a
SHA5128a851417a8abe971d682cc8a4bd20640998c552b28abea8d03b21735b126d62622ccb7457aa9e725aa5959f0f1b5f2da2edd51fe559983a916f8ec03251eddb4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4VT6R2QM\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheFilesize
53KB
MD5687ff3bb8a8b15736d686119a681097c
SHA118f43aa14e56d4fb158a8804f79fc3c604903991
SHA25651fd45579a0bee4beabbf7aa825ccc646f907dfdf27b2fc1791fa47dc90d5aa2
SHA512047b21b92e74c93f264e2547900decd295f3089b22165372c4060b76bb813ffa6f2af924974936e25a2db551ea1eec722329ae78e1fff08f6f104d041090094a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD55e3971e8790695843fd37231319510d4
SHA1e138306152d7368211b27a8462bdcc6136f2a7d0
SHA256040eb90fc84bfcdb95dc16dfd73c099db0bf6a89e8a676805acf8e837055f52b
SHA512f753f6ad4caead204b137f0adfda841ca553de3c0da0f1dc0fa49bb899074ca2d2933719c1468b598e3aa7d5b2a00e2bc576adca9288fd3df5ed5e68fe78b74f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5bb1c33a1a3bbff8ced39d26308f77211
SHA1c59c693e72c74c349b245b33b907dfb4e4ba4c3a
SHA2568685999934d4786f68afbe0f7ceeecd3e308fe8886cd2bc269ba7e3d43bf3c90
SHA5122d07992b52f2826969a4d5549f2812fad0999d9b858ae3e56b3ded04d058dfcada1987ae3b0c2c0cbbfed4a3ac734500a89d8750dd1b85351b6efd05202669b3
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\6CBF.tmp.exeFilesize
2.7MB
MD5f59f5f3f89c71811be2512ee230c3790
SHA1abe340c34343ecbc67a848de74d98b105876f5ea
SHA2568edc968a3a55ab036afc00566ac740afbfde2e40ca948e7f49c35861730abcc6
SHA5121f323b0b12ae597bf7bc339cd3839aa46f5a9eba1b841b09ceb7874693efebc7b0c9983d71c54f525e86672b9be0ce325c05d6281f042bd5017e2531d7068f1b
-
C:\Users\Admin\AppData\Local\Temp\6F60.tmp.exeFilesize
665KB
MD5e0e3613d55dc4d1a6b689f36f701a743
SHA1cb59ff5da37429d5e49cbdff2a45ed9b5168fe96
SHA256c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6
SHA5128a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e
-
C:\Users\Admin\AppData\Local\Temp\6F60.tmp.exeFilesize
665KB
MD5e0e3613d55dc4d1a6b689f36f701a743
SHA1cb59ff5da37429d5e49cbdff2a45ed9b5168fe96
SHA256c77f4cc5835df24b58246a328604bb5e36b4f1861789ce256f0f75d0fbfe1ce6
SHA5128a9293db7ad4962817b58602409c39e0c900a14ac0bd690983bba82e361cc35827eeb072818ce608b3b10a62429d30814ccdf0927df63e9570d65ae50fb9322e
-
C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\74C0.tmp.exeFilesize
3.4MB
MD598d5ab6991c6fc569e5c90a6241633d9
SHA144990ac5227ea16bbdf9d0b20cf94b738932ec66
SHA25677f039ea715bd52715f66a7f11c8214b4b8e809faf837115daafca1a2e166cc5
SHA51249a4e316517b4ce197a1bbcf812244a002887edbb60ad184209fc6b9d91ae62007658afccdd1770826c2af326f254849c23d1853cf051ab55650d93c5b0eb7a3
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lhkeeme2.rkp.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
memory/1012-174-0x0000000002B60000-0x0000000002B70000-memory.dmpFilesize
64KB
-
memory/1012-145-0x0000000005620000-0x0000000005642000-memory.dmpFilesize
136KB
-
memory/1012-144-0x0000000002B60000-0x0000000002B70000-memory.dmpFilesize
64KB
-
memory/1012-143-0x00000000001C0000-0x0000000000490000-memory.dmpFilesize
2.8MB
-
memory/1092-345-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-334-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-314-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-316-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-310-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-307-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-305-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-303-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-302-0x0000023EC3510000-0x0000023EC3520000-memory.dmpFilesize
64KB
-
memory/1092-301-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-318-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-320-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-322-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-312-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-284-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1092-336-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-338-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-1296-0x0000023EC3510000-0x0000023EC3520000-memory.dmpFilesize
64KB
-
memory/1092-341-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-343-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-350-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-352-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-358-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-354-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1092-356-0x0000023EDBE50000-0x0000023EDBF28000-memory.dmpFilesize
864KB
-
memory/1784-227-0x0000000005480000-0x0000000005490000-memory.dmpFilesize
64KB
-
memory/1784-223-0x00000000008F0000-0x0000000000BB2000-memory.dmpFilesize
2.8MB
-
memory/1784-262-0x0000000005480000-0x0000000005490000-memory.dmpFilesize
64KB
-
memory/1796-201-0x0000000000E00000-0x0000000000E1A000-memory.dmpFilesize
104KB
-
memory/1796-211-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1796-184-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1796-207-0x0000000000E30000-0x0000000000E32000-memory.dmpFilesize
8KB
-
memory/1796-186-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1796-187-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1796-188-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1796-212-0x0000000000DE0000-0x0000000000DFC000-memory.dmpFilesize
112KB
-
memory/1796-204-0x0000000000DE0000-0x0000000000DFC000-memory.dmpFilesize
112KB
-
memory/1796-205-0x0000000002A60000-0x0000000003A60000-memory.dmpFilesize
16.0MB
-
memory/1796-202-0x0000000000DE0000-0x0000000000DFC000-memory.dmpFilesize
112KB
-
memory/1796-200-0x0000000000DE0000-0x0000000000DFC000-memory.dmpFilesize
112KB
-
memory/1796-182-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1912-261-0x0000000000400000-0x00000000004B0000-memory.dmpFilesize
704KB
-
memory/1912-224-0x0000000003CF0000-0x0000000003D1C000-memory.dmpFilesize
176KB
-
memory/1912-226-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/1928-246-0x000001E3F1710000-0x000001E3F1732000-memory.dmpFilesize
136KB
-
memory/1928-265-0x000001E3F2130000-0x000001E3F2140000-memory.dmpFilesize
64KB
-
memory/1928-245-0x000001E3F2130000-0x000001E3F2140000-memory.dmpFilesize
64KB
-
memory/1928-231-0x000001E3EF750000-0x000001E3EFAB4000-memory.dmpFilesize
3.4MB
-
memory/2176-148-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-164-0x00000000064E0000-0x00000000064FE000-memory.dmpFilesize
120KB
-
memory/2176-177-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-146-0x0000000002BD0000-0x0000000002C06000-memory.dmpFilesize
216KB
-
memory/2176-147-0x0000000005600000-0x0000000005C28000-memory.dmpFilesize
6.2MB
-
memory/2176-176-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-175-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-173-0x00000000069F0000-0x0000000006A0A000-memory.dmpFilesize
104KB
-
memory/2176-172-0x0000000007B40000-0x00000000081BA000-memory.dmpFilesize
6.5MB
-
memory/2176-171-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-149-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/2176-156-0x0000000005EE0000-0x0000000005F46000-memory.dmpFilesize
408KB
-
memory/2176-150-0x0000000005E00000-0x0000000005E66000-memory.dmpFilesize
408KB
-
memory/3284-273-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3284-278-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3284-277-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/3824-300-0x0000027CD9C60000-0x0000027CD9C70000-memory.dmpFilesize
64KB
-
memory/3824-346-0x0000027CD9E70000-0x0000027CD9E78000-memory.dmpFilesize
32KB
-
memory/3824-332-0x0000027CD9E40000-0x0000027CD9E5C000-memory.dmpFilesize
112KB
-
memory/3824-299-0x0000027CD9C60000-0x0000027CD9C70000-memory.dmpFilesize
64KB
-
memory/3824-340-0x0000027CD9E60000-0x0000027CD9E6A000-memory.dmpFilesize
40KB
-
memory/3824-349-0x0000027CD9E80000-0x0000027CD9E8A000-memory.dmpFilesize
40KB
-
memory/3824-347-0x00007FF419930000-0x00007FF419940000-memory.dmpFilesize
64KB
-
memory/3888-258-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-283-0x0000012DAC160000-0x0000012DACC21000-memory.dmpFilesize
10.8MB
-
memory/3888-279-0x0000012DAC160000-0x0000012DACC21000-memory.dmpFilesize
10.8MB
-
memory/3888-259-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-269-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-257-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-268-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-267-0x0000012DACD00000-0x0000012DACD10000-memory.dmpFilesize
64KB
-
memory/3888-266-0x0000012DAC160000-0x0000012DACC21000-memory.dmpFilesize
10.8MB
-
memory/3948-214-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-216-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-215-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-206-0x000002A5B77B0000-0x000002A5B77B1000-memory.dmpFilesize
4KB
-
memory/3948-260-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-213-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-210-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-209-0x00007FF4C3AB0000-0x00007FF4C3BAA000-memory.dmpFilesize
1000KB
-
memory/3948-208-0x000002A5B7800000-0x000002A5B7807000-memory.dmpFilesize
28KB
-
memory/4536-263-0x00000000047A0000-0x00000000047B0000-memory.dmpFilesize
64KB
-
memory/4536-264-0x00000000047A0000-0x00000000047B0000-memory.dmpFilesize
64KB
-
memory/4536-244-0x00000000047A0000-0x00000000047B0000-memory.dmpFilesize
64KB
-
memory/4536-243-0x00000000047A0000-0x00000000047B0000-memory.dmpFilesize
64KB