Analysis
-
max time kernel
86s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
28-03-2023 08:20
Static task
static1
Behavioral task
behavioral1
Sample
ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe
Resource
win10v2004-20230221-en
General
-
Target
ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe
-
Size
4.8MB
-
MD5
4a56492354dc1156b0cea8846ea659b1
-
SHA1
b3a76097d520530021e8e8060fc9d90a33eacba1
-
SHA256
ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60
-
SHA512
a0db1c21f53df0220c40e89a51a790cb099d4ed07174a8bdfffaa225142369ab3e668d3e88dd0ad9f9f2ddc4b53889410cf29bae541f01ee1d192750b40a3302
-
SSDEEP
98304:zuWfI1A4bY1aOcDmV7XBLu0nfDM/wcwVq3z0Szr7BPJ7gEYvqiI9e2E9Cdvz2O2:z0A4byXcqBXBLVbMI8j0Sz5PxBYvqiIU
Malware Config
Signatures
-
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 14 2296 rundll32.exe 24 2296 rundll32.exe 29 2296 rundll32.exe 46 2296 rundll32.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\icudtl\Parameters\ServiceDll = "C:\\Program Files (x86)\\Windows Sidebar\\Shared Gadgets\\icudtl.dll" rundll32.exe -
Sets service image path in registry 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\icudtl\ImagePath = "C:\\Windows\\system32\\svchost.exe -k LocalService" rundll32.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exesvchost.exepid process 2296 rundll32.exe 2296 rundll32.exe 2180 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts rundll32.exe -
Accesses Microsoft Outlook profiles 1 TTPs 4 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 2296 set thread context of 1848 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 1976 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 4984 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 4748 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 4576 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 3988 2296 rundll32.exe rundll32.exe PID 2296 set thread context of 3328 2296 rundll32.exe rundll32.exe -
Drops file in Program Files directory 12 IoCs
Processes:
rundll32.exedescription ioc process File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\EPDF_Full.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\br.gif rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\EPDF_Full.aapp rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.html rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\A3DUtils.dll rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\reflow.api rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\br.gif rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\icudtl.dll rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\license.html rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\reflow.api rundll32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf rundll32.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\A3DUtils.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1272 2724 WerFault.exe ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe 3112 2180 WerFault.exe svchost.exe -
Checks processor information in registry 2 TTPs 52 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Identifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Status rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status rundll32.exe Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Component Information rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Platform Specific Field 1 Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz -
Modifies registry class 50 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe 2296 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
rundll32.exedescription pid process Token: SeDebugPrivilege 2296 rundll32.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
rundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 1848 rundll32.exe 2296 rundll32.exe 1976 rundll32.exe 2296 rundll32.exe 4984 rundll32.exe 2296 rundll32.exe 4748 rundll32.exe 4576 rundll32.exe 2296 rundll32.exe 3988 rundll32.exe 2296 rundll32.exe 3328 rundll32.exe -
Suspicious use of WriteProcessMemory 54 IoCs
Processes:
ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exerundll32.exedescription pid process target process PID 2724 wrote to memory of 2296 2724 ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe rundll32.exe PID 2724 wrote to memory of 2296 2724 ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe rundll32.exe PID 2724 wrote to memory of 2296 2724 ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe rundll32.exe PID 2296 wrote to memory of 1848 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1848 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1848 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 2324 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 2324 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 2324 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3624 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3624 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3624 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1976 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1976 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1976 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1076 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1076 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1076 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1712 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1712 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1712 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4984 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4984 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4984 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3476 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3476 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3476 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4748 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4748 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4748 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4296 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4296 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4296 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4576 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4576 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4576 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 1372 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1372 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 1372 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3752 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3752 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3752 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3988 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3988 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3988 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3064 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3064 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3064 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 3328 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3328 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 3328 2296 rundll32.exe rundll32.exe PID 2296 wrote to memory of 4688 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4688 2296 rundll32.exe schtasks.exe PID 2296 wrote to memory of 4688 2296 rundll32.exe schtasks.exe -
outlook_office_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe"C:\Users\Admin\AppData\Local\Temp\ca0ed04925eeeeb637c01eed367de4c6fe5860ccb06c4415c01389acf650bc60.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Ddpedoqywwaftue.dll,start2⤵
- Blocklisted process makes network request
- Sets DLL path for service in the registry
- Sets service image path in registry
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Modifies registry class
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\system32\shell32.dll",#61 140923⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask3⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 4802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2724 -ip 27241⤵
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k LocalService1⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 9402⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 2180 -ip 21801⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\icudtl.dllFilesize
5.3MB
MD5c87c4ff5095483f1c2f9e204b69d17d9
SHA19aa4107429c3e74616b0a1a7ee9566144909bdaf
SHA256838a6ca93e789ee9a5f44e8288eec928008e986f48b68ae2b53672afadb485e5
SHA512210f68795a83b7f024ed657a26446c335944f8d6fe38556f8413790e6c823ac568c97c21cfab856deac24f45b43164559ddd1043f782c445d2e9386ec60e4bbc
-
C:\Users\Admin\AppData\Local\Temp\Ddpedoqywwaftue.dllFilesize
5.3MB
MD5e73a2794863b456a67fd928e77242842
SHA1711a3e79727490a172536de19f9980726f8e5dbe
SHA256c5e9835d066417b8e96d88eb5dd828fed4e8b1501f164b770c3efb5a42b66875
SHA51214d13ed85325ffa593fc002a77f172e14a68bcbb2b63511060032ee30989886574e8a273a6e883e8b7400891086ea3c8e4dd53ff1a3f7780daabd8e1a4bff620
-
C:\Users\Admin\AppData\Local\Temp\Ddpedoqywwaftue.dllFilesize
5.3MB
MD5e73a2794863b456a67fd928e77242842
SHA1711a3e79727490a172536de19f9980726f8e5dbe
SHA256c5e9835d066417b8e96d88eb5dd828fed4e8b1501f164b770c3efb5a42b66875
SHA51214d13ed85325ffa593fc002a77f172e14a68bcbb2b63511060032ee30989886574e8a273a6e883e8b7400891086ea3c8e4dd53ff1a3f7780daabd8e1a4bff620
-
C:\Users\Admin\AppData\Local\Temp\Ddpedoqywwaftue.dllFilesize
5.3MB
MD5e73a2794863b456a67fd928e77242842
SHA1711a3e79727490a172536de19f9980726f8e5dbe
SHA256c5e9835d066417b8e96d88eb5dd828fed4e8b1501f164b770c3efb5a42b66875
SHA51214d13ed85325ffa593fc002a77f172e14a68bcbb2b63511060032ee30989886574e8a273a6e883e8b7400891086ea3c8e4dd53ff1a3f7780daabd8e1a4bff620
-
C:\Users\Admin\AppData\Local\Temp\Efduroudsheuydo.tmpFilesize
3.5MB
MD5697da26897c4d3aa50a4ff43c3057882
SHA18f0fb0879a93e0b881d879c19c51fef265714203
SHA2563b15216babf2f42bda71ed86f6605b0518edc1ba3f03f76c240264a208d3c545
SHA5121c7ce5c35b842b80219a253466f0dd2228ca64b577d11017fc37c4023df46b8798bc2856d0e175cfc990b7717e01aee1a893b6bb37e021049987e4e190c9f140
-
C:\Users\Admin\AppData\Local\Temp\FeptweFilesize
96KB
MD5e173dbc5c9d613b9b357516d89ad7053
SHA18b5dcd31d93bbc3c55f8d15552b8d22c175c4e58
SHA256cbf79df4d512d765cb9b65b7cb66b715e57a154079585d0ab73839ce769d0f84
SHA512bc5a478fe62b66c2569a677cae13283a116466932ba770b33c363df773cd0dacf3e552d9cb9b58a6a7577d8b66043b7b03cb259654444debe765da5b8417569f
-
C:\Users\Admin\AppData\Local\Temp\IwpipftiiwfFilesize
46KB
MD5b13fcb3223116f6eec60be9143cae98b
SHA19a9eb6da6d8e008a51e6ce6212c49bfbe7cb3c88
SHA256961fc9bf866c5b58401d3c91735f9a7b7b4fc93c94038c504c965491f622b52b
SHA51289d72b893acd2ec537b3c3deffcc71d1ce02211f9f5b931c561625ee7162052b511e46d4b4596c0a715e1c992310f2536ebdd512db400eeab23c8960ec4d312d
-
C:\Users\Admin\AppData\Local\Temp\Microsoft .NET Framework 4.7.2 Setup_20230221_025832476.htmlFilesize
93KB
MD51c1809aa46b031314ee6650e8a3e6a9a
SHA165298de7f36f4f4ac941253b5542b33e5df738f3
SHA256b27638d749f4991be3cf76084d87b438f23b592c992659d91ca135e85b2cbc15
SHA5128860e987425e8def83a28319425c0afb3507d285770903c898ace3cb4e5e4eaf46d24581dad14cef977d681b18c133df72cfb0c163fae4186f731c3285e8b6f7
-
C:\Users\Admin\AppData\Local\Temp\UXINIZSV-20230221-0303.logFilesize
57KB
MD5bd2486c411d59c5dc3cb099d81f867c3
SHA114d021c9552b2ebd8a13407ccbb7791fdac64c09
SHA25652dd88e97352e650149b32c54542e92e9255cb24b30c30090f552c2ddbfb2de3
SHA512a417446230a4f79bce6b99361c270fc23c2c872e1242017f0da15e312df0ae05f93bbb6d5c91438e2073bd71d0aad78f66f2ed9c69e17bce5d18ba776a9f9e0f
-
C:\Users\Admin\AppData\Local\Temp\aria-debug-3768.logFilesize
470B
MD52731ef3fc086d002ba5a31692037a5d9
SHA19760ad88bc34b6bc9c5311cc1f0c07acb5fe13ff
SHA256fb892fc42fb859fcd174ef8237b603ab0ceb30ca21ac4303f0f0a9f860f6f044
SHA512d92a65221ad169eff4cec524f9b2ba9bc3ed1a70cdc499ba3fd6d37b688e233c25fd9e91b194f18f87a32e44993016b4e4c4e715fa05ecffd5e53693ad48c9e9
-
C:\Users\Admin\AppData\Local\Temp\chrome_installer.logFilesize
6KB
MD5f0da4ff7e9901bc020c4196bf30fdd03
SHA1077435c1e7e486e71ef8247ec016f0b18a7a5077
SHA25690868fc335ac19289d5f63649e427e14ebbf9ae217ef712ae697a3952eb3070e
SHA512d5337a4c8d228220c8bb135ced7ed662da2b6f8a5379fcc6f4c32ae7643e1287a0e5e510aa4c3f9f22d68cf8371aee9442b7bac7622edfece5febdacca534cc1
-
C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI4AC8.txtFilesize
426KB
MD5ae67a7107a6e962874bbcdd3dbe5e7a1
SHA1e47629975196ca7e4e708f04953b1f7a6e130489
SHA256ebba5123ecfae373f7250b8fc3a69133b77cf3bc653146582dbaae1a9e4b9bdb
SHA512760cd7ee7839c7bdbe95bccff9834ad7a9f61532bd3ec0243a3511ee335b9e11175c88291c7f53b8d9f2085bd440f1feeef3de468a8f82f3e97f99657b220caf
-
C:\Users\Admin\AppData\Local\Temp\jawshtml.htmlFilesize
13B
MD5b2a4bc176e9f29b0c439ef9a53a62a1a
SHA11ae520cbbf7e14af867232784194366b3d1c3f34
SHA2567b4f72a40bd21934680f085afe8a30bf85acff1a8365af43102025c4ccf52b73
SHA512e04b85d8d45d43479abbbe34f57265b64d1d325753ec3d2ecadb5f83fa5822b1d999b39571801ca39fa32e4a0a7caab073ccd003007e5b86dac7b1c892a5de3f
-
C:\Users\Admin\AppData\Local\Temp\wctFE8A.tmpFilesize
63KB
MD5e516a60bc980095e8d156b1a99ab5eee
SHA1238e243ffc12d4e012fd020c9822703109b987f6
SHA256543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7
SHA5129b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58
-
memory/8-926-0x00000244BB880000-0x00000244BBB22000-memory.dmpFilesize
2.6MB
-
memory/8-941-0x00000244BB880000-0x00000244BBB22000-memory.dmpFilesize
2.6MB
-
memory/1552-1019-0x00000163EA670000-0x00000163EA912000-memory.dmpFilesize
2.6MB
-
memory/1552-1044-0x00000163EA670000-0x00000163EA912000-memory.dmpFilesize
2.6MB
-
memory/1572-884-0x0000019E45970000-0x0000019E45C12000-memory.dmpFilesize
2.6MB
-
memory/1572-889-0x0000019E45970000-0x0000019E45C12000-memory.dmpFilesize
2.6MB
-
memory/1848-320-0x0000000000590000-0x0000000000821000-memory.dmpFilesize
2.6MB
-
memory/1848-316-0x00000287F1370000-0x00000287F14B0000-memory.dmpFilesize
1.2MB
-
memory/1848-333-0x00000287EF920000-0x00000287EFBC2000-memory.dmpFilesize
2.6MB
-
memory/1848-321-0x00000287EF920000-0x00000287EFBC2000-memory.dmpFilesize
2.6MB
-
memory/1848-335-0x00000287EF850000-0x00000287EF877000-memory.dmpFilesize
156KB
-
memory/1848-315-0x00007FFD20120000-0x00007FFD20121000-memory.dmpFilesize
4KB
-
memory/1848-318-0x00000287EF920000-0x00000287EFBC2000-memory.dmpFilesize
2.6MB
-
memory/1848-317-0x00000287F1370000-0x00000287F14B0000-memory.dmpFilesize
1.2MB
-
memory/1976-349-0x0000020CF1850000-0x0000020CF1990000-memory.dmpFilesize
1.2MB
-
memory/1976-348-0x00007FFD20120000-0x00007FFD20121000-memory.dmpFilesize
4KB
-
memory/1976-350-0x0000020CF1850000-0x0000020CF1990000-memory.dmpFilesize
1.2MB
-
memory/1976-351-0x0000020CEFF90000-0x0000020CF0232000-memory.dmpFilesize
2.6MB
-
memory/1976-352-0x0000020CEFF90000-0x0000020CF0232000-memory.dmpFilesize
2.6MB
-
memory/1976-388-0x0000020CEFF90000-0x0000020CF0232000-memory.dmpFilesize
2.6MB
-
memory/2180-336-0x0000000000400000-0x0000000000964000-memory.dmpFilesize
5.4MB
-
memory/2296-314-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-203-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-224-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-223-0x0000000002DB0000-0x0000000002DB1000-memory.dmpFilesize
4KB
-
memory/2296-222-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-294-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-296-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-297-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-298-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-305-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-311-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/2296-312-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-221-0x0000000002090000-0x00000000025F4000-memory.dmpFilesize
5.4MB
-
memory/2296-313-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-220-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-219-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-218-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-217-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-319-0x0000000002090000-0x00000000025F4000-memory.dmpFilesize
5.4MB
-
memory/2296-215-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-214-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-213-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-211-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-210-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-337-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-339-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-340-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-341-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-343-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-344-0x0000000004300000-0x0000000004301000-memory.dmpFilesize
4KB
-
memory/2296-345-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-346-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-209-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-208-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-347-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-225-0x0000000004050000-0x0000000004190000-memory.dmpFilesize
1.2MB
-
memory/2296-202-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2296-200-0x0000000002090000-0x00000000025F4000-memory.dmpFilesize
5.4MB
-
memory/2296-201-0x00000000041C0000-0x00000000041C1000-memory.dmpFilesize
4KB
-
memory/2296-138-0x0000000002090000-0x00000000025F4000-memory.dmpFilesize
5.4MB
-
memory/2296-141-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/2296-142-0x0000000002630000-0x0000000002631000-memory.dmpFilesize
4KB
-
memory/2296-198-0x0000000002090000-0x00000000025F4000-memory.dmpFilesize
5.4MB
-
memory/2296-199-0x0000000003400000-0x0000000003F46000-memory.dmpFilesize
11.3MB
-
memory/2348-816-0x0000023CAC5C0000-0x0000023CAC862000-memory.dmpFilesize
2.6MB
-
memory/2348-801-0x0000023CAC5C0000-0x0000023CAC862000-memory.dmpFilesize
2.6MB
-
memory/2352-622-0x000002AD9B7C0000-0x000002AD9BA62000-memory.dmpFilesize
2.6MB
-
memory/2352-638-0x000002AD9B7C0000-0x000002AD9BA62000-memory.dmpFilesize
2.6MB
-
memory/2432-764-0x00000266D6EB0000-0x00000266D7152000-memory.dmpFilesize
2.6MB
-
memory/2432-759-0x00000266D6EB0000-0x00000266D7152000-memory.dmpFilesize
2.6MB
-
memory/2724-139-0x00000000053C0000-0x0000000005A66000-memory.dmpFilesize
6.6MB
-
memory/2724-140-0x0000000000400000-0x0000000003002000-memory.dmpFilesize
44.0MB
-
memory/2896-992-0x00000295D4820000-0x00000295D4AC2000-memory.dmpFilesize
2.6MB
-
memory/2896-977-0x00000295D4820000-0x00000295D4AC2000-memory.dmpFilesize
2.6MB
-
memory/2908-665-0x000002012C360000-0x000002012C602000-memory.dmpFilesize
2.6MB
-
memory/2908-691-0x000002012C360000-0x000002012C602000-memory.dmpFilesize
2.6MB
-
memory/3328-586-0x0000025DEB550000-0x0000025DEB7F2000-memory.dmpFilesize
2.6MB
-
memory/3328-581-0x0000025DEB550000-0x0000025DEB7F2000-memory.dmpFilesize
2.6MB
-
memory/3988-539-0x00000256132F0000-0x0000025613592000-memory.dmpFilesize
2.6MB
-
memory/3988-564-0x00000256132F0000-0x0000025613592000-memory.dmpFilesize
2.6MB
-
memory/4004-723-0x0000023E384D0000-0x0000023E38772000-memory.dmpFilesize
2.6MB
-
memory/4004-707-0x0000023E384D0000-0x0000023E38772000-memory.dmpFilesize
2.6MB
-
memory/4576-497-0x0000024D8EC30000-0x0000024D8EED2000-memory.dmpFilesize
2.6MB
-
memory/4576-513-0x0000024D8EC30000-0x0000024D8EED2000-memory.dmpFilesize
2.6MB
-
memory/4748-461-0x000001FC09480000-0x000001FC09722000-memory.dmpFilesize
2.6MB
-
memory/4748-456-0x000001FC09480000-0x000001FC09722000-memory.dmpFilesize
2.6MB
-
memory/4984-419-0x00000209878C0000-0x0000020987B62000-memory.dmpFilesize
2.6MB
-
memory/4984-403-0x00000209878C0000-0x0000020987B62000-memory.dmpFilesize
2.6MB
-
memory/5020-852-0x000001F280940000-0x000001F280BE2000-memory.dmpFilesize
2.6MB
-
memory/5020-868-0x000001F280940000-0x000001F280BE2000-memory.dmpFilesize
2.6MB