Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 15:53
Static task
static1
Behavioral task
behavioral1
Sample
ffa36b7c0e760e7825212b9fa3745187_JaffaCakes118.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ffa36b7c0e760e7825212b9fa3745187_JaffaCakes118.html
Resource
win10v2004-20240412-en
General
-
Target
ffa36b7c0e760e7825212b9fa3745187_JaffaCakes118.html
-
Size
455KB
-
MD5
ffa36b7c0e760e7825212b9fa3745187
-
SHA1
a22a642e273b20ba7d66d724d719f2ef0d1fdccb
-
SHA256
b674e03d42ddc314eb78d21773bc0ef60adbe8faeae9aacae48f5246ca06e8ce
-
SHA512
c095d4d10a890bf4c3bb5feb78589be9072363e78eb1e9cccd78e763d9db22db10fc813b17b84ee774dcaf5d1577d8d302453dd0807b3b58bf27b17b7cfc3914
-
SSDEEP
6144:BiUXWy3jsMYod+X3oI+YosMYod+X3oI+YmsMYod+X3oI+YjsMYod+X3oI+YQ:T5d+X3A5d+X3q5d+X3R5d+X3+
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
Processes:
svchost.exeDesktopLayer.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exesvchost.exeDesktopLayer.exeDesktopLayer.exepid process 2652 svchost.exe 2456 DesktopLayer.exe 2052 FP_AX_CAB_INSTALLER64.exe 1800 svchost.exe 1788 DesktopLayer.exe 1020 svchost.exe 1428 svchost.exe 1900 DesktopLayer.exe 908 DesktopLayer.exe -
Loads dropped DLL 6 IoCs
Processes:
IEXPLORE.EXEsvchost.exepid process 2388 IEXPLORE.EXE 2652 svchost.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\svchost.exe upx behavioral1/memory/2652-13-0x0000000000240000-0x000000000026E000-memory.dmp upx behavioral1/memory/2456-21-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2456-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2652-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2652-6-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1788-137-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1788-136-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/1900-610-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/1900-623-0x0000000000230000-0x000000000023F000-memory.dmp upx -
Drops file in Program Files directory 9 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px86A.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB06B.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\pxB0D8.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px28A6.tmp svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
IEXPLORE.EXEdescription ioc process File created C:\Windows\Downloaded Program Files\SET2868.tmp IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\swflash64.inf IEXPLORE.EXE File opened for modification C:\Windows\INF\setupapi.app.log IEXPLORE.EXE File opened for modification C:\Windows\Downloaded Program Files\SET2868.tmp IEXPLORE.EXE -
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "419876709" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5E91BB31-FFF7-11EE-9E06-5628A0CAC84B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d037c4152fa93a4781e6e9d093f648890000000002000000000010660000000100002000000012fce047059b59acf7a72d89a43105d2599e4dd71d62acd572dded3652f97ae1000000000e80000000020000200000000de2efa35ea8312045169e44de7ea477ded182c88cc56f9c72f23f2a58d8567120000000a31870e634977c051e962432623c34e3ebbf686b789ed0f2b505c5cfda0b13e440000000dd2a5fd22cadb10d94cd80958642b07f60b8b1dec3e8b9b6a4a2826816cf0fb873f3f10de023cbc15cec6e4de17c70cf49b878a8d828b31dd23ff82821b1e558 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e034f1390494da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
DesktopLayer.exeFP_AX_CAB_INSTALLER64.exeDesktopLayer.exeDesktopLayer.exeDesktopLayer.exepid process 2456 DesktopLayer.exe 2456 DesktopLayer.exe 2456 DesktopLayer.exe 2456 DesktopLayer.exe 2052 FP_AX_CAB_INSTALLER64.exe 1788 DesktopLayer.exe 1788 DesktopLayer.exe 1788 DesktopLayer.exe 1788 DesktopLayer.exe 1900 DesktopLayer.exe 1900 DesktopLayer.exe 1900 DesktopLayer.exe 1900 DesktopLayer.exe 908 DesktopLayer.exe 908 DesktopLayer.exe 908 DesktopLayer.exe 908 DesktopLayer.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
IEXPLORE.EXEdescription pid process Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE Token: SeRestorePrivilege 2388 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
iexplore.exepid process 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe -
Suspicious use of SetWindowsHookEx 28 IoCs
Processes:
iexplore.exeIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEIEXPLORE.EXEpid process 2356 iexplore.exe 2356 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 2356 iexplore.exe 2356 iexplore.exe 2488 IEXPLORE.EXE 2488 IEXPLORE.EXE 2356 iexplore.exe 2356 iexplore.exe 2284 IEXPLORE.EXE 2284 IEXPLORE.EXE 2356 iexplore.exe 2356 iexplore.exe 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 1452 IEXPLORE.EXE 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe 2356 iexplore.exe 2388 IEXPLORE.EXE 2388 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE 1488 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
iexplore.exeIEXPLORE.EXEsvchost.exeDesktopLayer.exeFP_AX_CAB_INSTALLER64.exesvchost.exeDesktopLayer.exesvchost.exeDesktopLayer.exedescription pid process target process PID 2356 wrote to memory of 2388 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2388 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2388 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2388 2356 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 2652 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 2652 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 2652 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 2652 2388 IEXPLORE.EXE svchost.exe PID 2652 wrote to memory of 2456 2652 svchost.exe DesktopLayer.exe PID 2652 wrote to memory of 2456 2652 svchost.exe DesktopLayer.exe PID 2652 wrote to memory of 2456 2652 svchost.exe DesktopLayer.exe PID 2652 wrote to memory of 2456 2652 svchost.exe DesktopLayer.exe PID 2456 wrote to memory of 2724 2456 DesktopLayer.exe iexplore.exe PID 2456 wrote to memory of 2724 2456 DesktopLayer.exe iexplore.exe PID 2456 wrote to memory of 2724 2456 DesktopLayer.exe iexplore.exe PID 2456 wrote to memory of 2724 2456 DesktopLayer.exe iexplore.exe PID 2356 wrote to memory of 2488 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2488 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2488 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2488 2356 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2388 wrote to memory of 2052 2388 IEXPLORE.EXE FP_AX_CAB_INSTALLER64.exe PID 2052 wrote to memory of 1676 2052 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2052 wrote to memory of 1676 2052 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2052 wrote to memory of 1676 2052 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2052 wrote to memory of 1676 2052 FP_AX_CAB_INSTALLER64.exe iexplore.exe PID 2356 wrote to memory of 2284 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2284 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2284 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 2284 2356 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 1800 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1800 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1800 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1800 2388 IEXPLORE.EXE svchost.exe PID 1800 wrote to memory of 1788 1800 svchost.exe DesktopLayer.exe PID 1800 wrote to memory of 1788 1800 svchost.exe DesktopLayer.exe PID 1800 wrote to memory of 1788 1800 svchost.exe DesktopLayer.exe PID 1800 wrote to memory of 1788 1800 svchost.exe DesktopLayer.exe PID 1788 wrote to memory of 1120 1788 DesktopLayer.exe iexplore.exe PID 1788 wrote to memory of 1120 1788 DesktopLayer.exe iexplore.exe PID 1788 wrote to memory of 1120 1788 DesktopLayer.exe iexplore.exe PID 1788 wrote to memory of 1120 1788 DesktopLayer.exe iexplore.exe PID 2356 wrote to memory of 1452 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1452 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1452 2356 iexplore.exe IEXPLORE.EXE PID 2356 wrote to memory of 1452 2356 iexplore.exe IEXPLORE.EXE PID 2388 wrote to memory of 1020 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1020 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1020 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1020 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1428 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1428 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1428 2388 IEXPLORE.EXE svchost.exe PID 2388 wrote to memory of 1428 2388 IEXPLORE.EXE svchost.exe PID 1020 wrote to memory of 1900 1020 svchost.exe DesktopLayer.exe PID 1020 wrote to memory of 1900 1020 svchost.exe DesktopLayer.exe PID 1020 wrote to memory of 1900 1020 svchost.exe DesktopLayer.exe PID 1020 wrote to memory of 1900 1020 svchost.exe DesktopLayer.exe PID 1900 wrote to memory of 1676 1900 DesktopLayer.exe iexplore.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\ffa36b7c0e760e7825212b9fa3745187_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:275457 /prefetch:22⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exeC:\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://get3.adobe.com/flashplayer/update/activex4⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:209932 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:406543 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:406548 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2356 CREDAT:209961 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCCFilesize
252B
MD5d524c3a0a0850bf01c86ac73be2d1971
SHA12a9de2a72945bcb7d2772c005247b19ed43053f1
SHA256ea6dae41f7b84d0cce248d590d7d4946b2bc000efb820fce6b7913be651d6d9e
SHA512a85dd0926f116835e51e8e1e1aad7105249fa197831972b90119c60c876894fae4052fd34758e0fdf33c2a502434fdb0f295592defe7af1fb19b27ad47741e77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD519e15e637717b73af524ad7b5ed5cc5b
SHA1ddb66ee2dcb1f60e8c83aa02fefda7f24ef89da8
SHA256dc439b9b22425e6126a9a3b72547251877a8e6169257cc1e7f4ec881f795538e
SHA512f51729611faa616f973d678c7577739ee7962745e033b7c6d6628951612a1da34f84e4c4cfa9e650b9a782948748c15508055f1fe41aa00669a1ea3499cd164b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59afdcf795364a0b6ef7f29361728cf95
SHA196008b53aff897bbd1ccf84407a0798cbce5251a
SHA256bf5f92a6409ef97ea8ac0e19b15d9e6ef3d1451490f2a0c4e27585980c64265d
SHA5127324f505e88b895950ec0011067f5f3fe52ea61521715d570b1ceaef942c8c5693f8efb2050e6f937c988dffe0b1f498d70031a60a7068f1e64198a64ba50a6f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5e0c5a35791c18e0a364e4c27a2506acd
SHA1f5e690bd5635fd79c39f10db747488031c6d225c
SHA256be81be949a345e9d8f8cdf5a7c744f0d1fe158b820ce99bdf3716878aebb532e
SHA512047a01cc91a3e45736e2a62305d814c79a5fe097826c05f50fa40010762137f053dab7bdfa6b2306d9bae9ab0fb3c1a764111ef73e0666e2d2159ec74e1c4f2e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD59548352e8336567f4eeeb9a9caaa4ffd
SHA1a1cc5b7633ba565d0ba919825fd7bd88bbc05a88
SHA256ecdd1c44c82278f4ecdc2a4e49a7582e3d99473841fba374c67ddc6fe6e7552d
SHA512031c0a8430b33fe99ea1a8f6aa9f447141ebcd594676839163ffe3a06363da5ecb6e3e96696b96df9699ef21e81fa6b9f650ba630e157de29914aa86714aeb80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5bddec067a9fb02eb8dcb1e09e88a449c
SHA1544d49f8ad5bc41718e6f196b048b0892dc1b060
SHA25697ac1e41731a44620bdc91b4e8e4f49c42929b7bd5980de7b3fc6f62af707f01
SHA512c5b8f3aa46fa997614c00d3c270490f214d8e91a965f7ea07cb4679929dfd6e6f17292cdacd4733e65667350c8990141e122aac8c96e967d8eaecdbe9b9d4b71
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD540477170058d8eedc48c5a546c8bd453
SHA144add39c5631438461953e9db1807ac38f92ed54
SHA256e2b64359a8245eccb16b2b2cabd8516556b9da41f011dc27211255f92541a810
SHA512ea4e3fa7586cc914648f9f6bc19acc2fbb40bb79b1b0af4bb0d0fb4276b10ea8fc84f8d3ee4134d67e4c73157b5c4a0da8fdef2ee685b84c035631e91de86067
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58f8bd2aa802c05d66e3f8d3dae10200e
SHA1816c2a00e6254cd4743947c5cde45ea2aa0b4d42
SHA256bffe9bf3b9797f0149989d28e49bb8320b1f5cb4c03816fdebf1a3485d7f64cd
SHA512385c32eec1e7a0a442cad0d22e200aa4f9d5735bed5237ba8f7d169384fcb87b1e7edcb25459f5651a7c50b5dc6316707804d6fde6ca21eea096d776e72b37c1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58590831ddf41f923d799ae16f5707f63
SHA1db30063c7b2531c54213eb5a1d5610a9ebb03db8
SHA256a3aa765e8c2de532a3d6125a43bc8540ed06eb3a61e944ac6d1e557aad10fa34
SHA512310f18200ce02156f5f72959e03e53ffb0234c94d8a5617aba9ad1e9e92daabc7189f5429e529d64a410044d3fb2ac35e9a4f70ae7e405ef23ecceb2ff633809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5cd9749a67fcce46e64388c3ae6f2f061
SHA1f1464d2ee35acfd28c4b8b7c8357110328549bd6
SHA2567ab65252cb2f5c380d598305fca8bfa0c41b5e367b015424394251aee81d46de
SHA512818a75dc2707aba0c38dbcfbcf39cb8b9714fa5dc88dbad6df24f457339aa05452d82c9be4339b4c24853631cc00d149276bfc76c9c6a4bbee3316543da00f63
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5f70b2be6ad29189bf7f48ec5c6165c59
SHA1721af30e757223cb9f359ea94aaa589d3d05bc6f
SHA256a73418bde692f66b8ba1397fe6d8c6aa88a6f22b6aafd7370ae8b33149037378
SHA51218fb5e943960dff280b012411ba61e9b74a948b6522aef8037cab7565e23cc29919c84b694ebd89f924096be2f215dc8d1a9425a0b38f8a609305d4bd91d2fcb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD53860d6a61d5506ddaf5cabb5c08c7848
SHA1c64d26382e0c9ddfaf28cc97e3aa1328a188d12a
SHA2564ef4f96f8b5c53f1a2df5b1f7a55c7c2c23dc028fdaeb56ef6a12edeb48f03b5
SHA512299849b17389b41ed6dc40d96f8e779fd6f5291e29c7826354ee6e8e0dbd62f7a04767861e0423dc96d55d443d0a654abf7830f24a5a948a0d20f98bdfef5792
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5287acd59e3a3588ae53571d0551df8f3
SHA1a2bdb4f84949ec1e1244fc7ebc82f463e2024453
SHA256ac4a85e1acfc9cceaad9ba84085155ae5e28378919d112eb9de473eea1ca6624
SHA512e1733ac943231acc3ad0a93666080ff00d96c84d8996f75e96c031f9d5398f29edeffa59a76332f3f3bd69acd15bc61a891fb22ca3b0abf0da2a46bc1164f03d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5c1a5618fb8491c92acdf3960479a3026
SHA10333023f76ba42fa9f3956cf65776920ad9e597f
SHA2566f7bae8859dee67e6bdd16d9cbb5f952d8ed193fb4dfe79c14a22a8392e2ee24
SHA512f5ab3fdaf866387f017551cb356015e7d8816b8050a16a441a5b3f812e48e083d77eeb4aeddb2596b7b3372619696165c591b3ccfa361b91da5f18ca0d200f44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD599d20240c8d0f95a7d439b44b75bc854
SHA1fe307f79055af543f16ddbd317c4f815e1fda196
SHA256eda552f385fa547c64ad39a4d22ef80cb6f78722273ce593a6fcba7ef2a65b5a
SHA512760a5737d905d7809e5c19c981964d6d2f56ed92ebc4b66b0847f5d5fc907be50d468ce73947c08107a49a7d8b407f2c316f75a484c4e7b2bf5fc55115fd3275
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD522fc0c57c67e49c1260c03bd51d4fe62
SHA1c3a42c0370d43b5aae096feb14cd204f52ac3b54
SHA256cb3e62abad66f1937d851ce91bf9dd693e06b5deab809b11bf697efc8da0420b
SHA5125a9b8935300d94d37e820de3f0400e322e3c03acf137e270ecb9e202c23ab4ca680fe2c5d29f6e493c3024d08e495f4885f12bd6a06fdd7da50d603d2f13699e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD51b3b23f6d4a8b0a3eaa72e0a7df3adb3
SHA14e53dfbd6312549a862a67c5c1e4b2ef7c4d0f82
SHA256da7e4b64b7f3bab5c26c4b848f8e77d80077c314cdb93d10724044ce32d65f90
SHA512404ec119914678a202166a2f0e5815f0e757c7dc3815df321a2b851ce95ec08bd0f63a366dcc447aba33faf6102fd61237f4d64b023b4e97406c5a0729628ad9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5488e135297aa119649c621e7fae4c189
SHA1671cc886af03ac18bf843d4c14bae23770744cdf
SHA2567f08c3bd80ce525c80dc7bee5f0190e73f90c652916892a3521ad58e0fadf776
SHA512dd9c8bd1be7a8e28f154ccacb868bfa66e2e01e097d2dcde408858420f4035539b516431c4276edd703c7c324451929f955dc274b4c0639ba4cdf77efb227531
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5a6822c0e729b507d018146fbd71892a4
SHA19c054b0a128751bcf37e1b89bc5361707e068d0b
SHA256269fa94df8e7153a80b6a9b938f23fb8f93ddf77b05fc12b5935df0c2d563c10
SHA51268c6b925f087549cf9ac4cf2e18450244836e149c017f7e1f838e9d53cfeab875ca4298a8b7d8c71d420fdb4eeceec5067a4130cdab0de24192b00352aafea0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD5d533ec13275bebb68ff2b1014b3bbed9
SHA101c34cbf5aa7f58fa8099cdd39af021fe985b9f8
SHA256b7797ad56580f390cf0724a8d5fb6a4ac5b8622bbe42f5042bc55605f7a02938
SHA5126ff608a45d69bdeffa0a4e2e71a2524811738c2a5e03a61855068e27720ff145dfc8ddde81d3fc627d847430002f601cffaa493249fe058f6e63479b3850a1cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD58d134216a3dfb73cfde6c0b683f62168
SHA131cbfc8b81cead053842c1f3aa7fb673f9d7be0a
SHA25698c9a90005904dee820026d34bc223e07ebf6229d716633807083e3f31583ae9
SHA512ac14c313b19779320e379799f014338101e552c2830acc206ea38777d35b5bb8bbce8d3c321c1423b475ee5f28af9f3c13c7083c89fa19c46b93d43f09f60145
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
344B
MD591b12ffd47a807460059fa95f6edff94
SHA1d27faa6855b2b272d0dcb5790628877038cc97e1
SHA2563bcb5eb5a1e30c747fc8e06d736bdf8b57ee77ac759a896012ee7c15b314e21f
SHA512d9fff9fdc104fc4025fb3c0439c8dc9b9c90c50d79091fa63e27a4f9035bbcee72d6e025d63876993dc823ab668328e35cc425fba437a42d43e4b2dbf6013611
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357Filesize
242B
MD5b678644753c4b6139123fe6b129a8861
SHA16083a7e3d4fb5d1aba998b4db2b5b91554789a01
SHA256226ce0a2b1fc52d055d197d2558b3e5bde4065a2d9603cfc0e5be71906fd8cb9
SHA512da322ad344e0b23f675977fa6c6aee9bdd98204eb77f5be0abd829af2c770c0158a16a003b1122d81039a9687f89a1ca128d0f14b51510e7e78507c9f01bff65
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\32DO9ZP7\swflash[1].cabFilesize
225KB
MD5b3e138191eeca0adcc05cb90bb4c76ff
SHA12d83b50b5992540e2150dfcaddd10f7c67633d2c
SHA256eea074db3f86fed73a36d9e6c734af8080a4d2364e817eecd5cb37cb9ec9dc0b
SHA51282b4c76201697d7d25f2e4f454aa0dd8d548cdfd3ebfa0dd91845536f74f470e57d66a73750c56409510d787ee2483839f799fef5d5a77972cd4435a157a21a4
-
C:\Users\Admin\AppData\Local\Temp\ICD1.tmp\swflash64.infFilesize
218B
MD560c0b6143a14467a24e31e887954763f
SHA177644b4640740ac85fbb201dbc14e5dccdad33ed
SHA25697ac49c33b06efc45061441a392a55f04548ee47dc48aa8a916de8d13dabec58
SHA5127032669715c068de67d85d5d00f201ee84bb6edac895559b2a248509024d6ce07c0494835c8ee802dbdbe1bc0b1fb7f4a07417ef864c04ebfaa556663dfd7c7f
-
C:\Users\Admin\AppData\Local\Temp\Tar24C5.tmpFilesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
\Users\Admin\AppData\Local\Temp\ICD1.tmp\FP_AX_CAB_INSTALLER64.exeFilesize
757KB
MD547f240e7f969bc507334f79b42b3b718
SHA18ec5c3294b3854a32636529d73a5f070d5bcf627
SHA256c8c8cff5dc0a3f205e59f0bbfe30b6ade490c10b9ecc7043f264ec67ef9b6a11
SHA51210999161970b874db326becd51d5917f17fece7021e27b2c2dfbee42cb4e992c4d5dbeac41093a345ad098c884f6937aa941ec76fb0c9587e9470405ecb67161
-
\Users\Admin\AppData\Local\Temp\svchost.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/908-621-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1020-607-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1788-136-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1788-139-0x00000000778AF000-0x00000000778B0000-memory.dmpFilesize
4KB
-
memory/1788-599-0x00000000778AF000-0x00000000778B0000-memory.dmpFilesize
4KB
-
memory/1788-137-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/1788-135-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1800-129-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1900-623-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1900-609-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB
-
memory/1900-612-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/1900-610-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2456-598-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2456-20-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2456-21-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2456-19-0x00000000001C0000-0x00000000001CF000-memory.dmpFilesize
60KB
-
memory/2456-18-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/2652-6-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2652-8-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2652-10-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2652-13-0x0000000000240000-0x000000000026E000-memory.dmpFilesize
184KB