Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe
Resource
win10v2004-20240426-en
General
-
Target
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe
-
Size
3.5MB
-
MD5
8e1d90f09e0627a3b6225ae5be6ce80d
-
SHA1
578fd8c25ce5ef60dd5786940e90a44f3ff420cc
-
SHA256
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e
-
SHA512
9ae682cf05c361e49778f5fb589c5da00997919ce72ea56a7cf588560557b77e9b93e4ea450ee2dce972c41216a9c51e0b4ba2ffecfde60f00ca579f7939a65d
-
SSDEEP
98304:A1VVv28GMAMV4nsmtk2aSrJpmPhekGZvQYocMRMh6:ytGLLpt6
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
Processes:
resource yara_rule \Windows\SysWOW64\259424280.bat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
Processes:
GLk.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\259424280.bat" GLk.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe aspack_v212_v242 -
Executes dropped EXE 6 IoCs
Processes:
GLk.exeHD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeSynaptics.exesvchist.exe._cache_Synaptics.exepid process 2512 GLk.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2976 Synaptics.exe 524 svchist.exe 3752 ._cache_Synaptics.exe -
Loads dropped DLL 19 IoCs
Processes:
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeGLk.exesvchost.exeHD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exesvchist.exeSynaptics.exe._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_Synaptics.exepid process 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2512 GLk.exe 2692 svchost.exe 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2692 svchost.exe 524 svchist.exe 2976 Synaptics.exe 2976 Synaptics.exe 2976 Synaptics.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe -
Drops file in System32 directory 26 IoCs
Processes:
._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_Synaptics.exeGLk.exesvchost.exedescription ioc process File created C:\Windows\system32\WINABC.HLP ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File opened for modification C:\Windows\system32\WINABC.OVL ._cache_Synaptics.exe File created C:\Windows\SysWOW64\WINABC.CNT ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\Windows\system32\WINABC.OVL ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File opened for modification C:\Windows\SysWOW64\WINABC.CWD ._cache_Synaptics.exe File created C:\WINDOWS\SysWOW64\WINABC.IME ._cache_Synaptics.exe File created C:\Windows\system32\WINABC.CWD ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\Windows\SysWOW64\WINABC.CWD ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File opened for modification C:\Windows\system32\WINABC.CNT ._cache_Synaptics.exe File opened for modification C:\Windows\SysWOW64\WINABC.HLP ._cache_Synaptics.exe File created C:\Windows\SysWOW64\WINABC.IME ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\Windows\SysWOW64\WINABC.OVL ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File opened for modification C:\Windows\SysWOW64\WINABC.CNT ._cache_Synaptics.exe File opened for modification C:\Windows\system32\WINABC.IME ._cache_Synaptics.exe File created C:\Windows\SysWOW64\259424280.bat GLk.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe File created C:\Windows\system32\WINABC.CNT ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\Windows\SysWOW64\WINABC.HLP ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\Windows\system32\WINABC.IME ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File created C:\WINDOWS\SysWOW64\WINABC.IME ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\WINABC.OVL ._cache_Synaptics.exe File opened for modification C:\Windows\system32\WINABC.CWD ._cache_Synaptics.exe File opened for modification C:\Windows\system32\WINABC.HLP ._cache_Synaptics.exe File opened for modification C:\Windows\SysWOW64\WINABC.IME ._cache_Synaptics.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
Processes:
._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_Synaptics.exepid process 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 5 IoCs
Processes:
._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_Synaptics.exeEXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 8324 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exepid process 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe._cache_Synaptics.exeEXCEL.EXEpid process 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 2972 ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe 3752 ._cache_Synaptics.exe 3752 ._cache_Synaptics.exe 8324 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeHD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exesvchost.exeSynaptics.exedescription pid process target process PID 2760 wrote to memory of 2512 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe GLk.exe PID 2760 wrote to memory of 2512 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe GLk.exe PID 2760 wrote to memory of 2512 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe GLk.exe PID 2760 wrote to memory of 2512 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe GLk.exe PID 2760 wrote to memory of 2864 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2760 wrote to memory of 2864 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2760 wrote to memory of 2864 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2760 wrote to memory of 2864 2760 b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2864 wrote to memory of 2972 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2864 wrote to memory of 2972 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2864 wrote to memory of 2972 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2864 wrote to memory of 2972 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe ._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe PID 2864 wrote to memory of 2976 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Synaptics.exe PID 2864 wrote to memory of 2976 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Synaptics.exe PID 2864 wrote to memory of 2976 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Synaptics.exe PID 2864 wrote to memory of 2976 2864 HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe Synaptics.exe PID 2692 wrote to memory of 524 2692 svchost.exe svchist.exe PID 2692 wrote to memory of 524 2692 svchost.exe svchist.exe PID 2692 wrote to memory of 524 2692 svchost.exe svchist.exe PID 2692 wrote to memory of 524 2692 svchost.exe svchist.exe PID 2976 wrote to memory of 3752 2976 Synaptics.exe ._cache_Synaptics.exe PID 2976 wrote to memory of 3752 2976 Synaptics.exe ._cache_Synaptics.exe PID 2976 wrote to memory of 3752 2976 Synaptics.exe ._cache_Synaptics.exe PID 2976 wrote to memory of 3752 2976 Synaptics.exe ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe"C:\Users\Admin\AppData\Local\Temp\b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeC:\Users\Admin\AppData\Local\Temp\\HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe"C:\Users\Admin\AppData\Local\Temp\._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3752
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:2564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\259424280.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:524
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:8324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\HD_X.datFilesize
1.2MB
MD56bc158e1e67fa0f6930651506d553118
SHA164418a0c8751adcf869bad8c5ba7314ba9d1e8b6
SHA2563d97e9c9f64f303878cfa188d5dcf47ce75b5de30e94b02ccffa83ebb4f6908c
SHA5126338408f2658eb9df8897c94de2a2ac73ed8fa8c3e6484d8d06b17cb24fdf262490db741df8ec7705eb5871663b63257909431fb7224da8a9324216019e96970
-
C:\Users\Admin\AppData\Local\Temp\T1zdi7Ta.xlsmFilesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
C:\Windows\SysWOW64\WINABC.CNTFilesize
1KB
MD56dda1f4625d8d54da52938bc14723347
SHA1634b03f556b05c7863b64e8bf9964de9ffaa3cd3
SHA2564ea278e7d4ff35fa9023196f18432ab1451be0d45156ab098e3884a523c0b15b
SHA512e522c307ef6be163bd8b49ca02e6fe181b340d5f1262acb8e4ce9e7da20d6f88deaa75bbb552e2c239d7c7b366cf4d0757494bd34e231a0467799b3c8edd2970
-
C:\Windows\SysWOW64\WINABC.CWDFilesize
279KB
MD5bbfc567b238c2a1a49e76f3183be2e5f
SHA1d46f9bcfdcf2be0f2b75e3e591852c07c0f966a8
SHA256dfc43d699cfd0b7afb3432b77b93bb46fdcb60a9fb519f23f34d72f533a7e947
SHA512c045dfd061b9ca7b93a209eae2f03c2485dd275ac3cca93c18df5cf292989d57b7b7a62f7abf898c5aa979ac0d6726a139866e4350a811e37e74d25ddb4d05ab
-
C:\Windows\SysWOW64\WINABC.HLPFilesize
338KB
MD537fb0e0c62ecdf058f6d368cdb70c1ea
SHA177b25681c22e0399bb0d7f8c21927966b5a80c96
SHA2568864f200c309a9fafd3bc3878be7a8581e3379225bfbccba121c986b07338fd6
SHA512f31f52fac14ee0fef21cbb90df63cd27cef1f8c9fa48ff3faa013c5bc57fc5a2ccada48b9895b0cd2e9da8e66f36b0d69da80d948b1ffbf2f2f8502c15a9eae0
-
C:\Windows\SysWOW64\WINABC.OVLFilesize
75KB
MD556e55a412a19397e8e3709fc343ad787
SHA1138e1707a795fe1e46cb14bf4861902e743e28ef
SHA25679b3e83313f757245436d8b6d13ac717955c554c46af486167ce3b662e92cd8b
SHA51216b997bb44324bdb5e5d859acfdf8e8bfa1ce6bd0f3f8dd294e24f4913c1de3d3e0e7224597cabf3e59edd3ee77dc268aa79f117abc8ce7ff892eabbf3c29c2b
-
C:\Windows\SysWOW64\svchist.exeFilesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
C:\Windows\System32\WINABC.IMEFilesize
96KB
MD534b248ee78201f3f72a648527e2bf945
SHA1c5e2e01a69981d7084b23959b397f716641eaeb8
SHA25636589d83c62074584a27c19759d86b4576450141afca34c1f5cb19016c6e7042
SHA512acf3b6b15b254e9070efbbe66d1293659fb3feb58b9a7fb5ddd9a784e4d43d869cf1e1a40359c580331fd3a0f1254159ede106258af155fe4ba3495712408e74
-
\Users\Admin\AppData\Local\Temp\._cache_HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeFilesize
1.6MB
MD52b3251d0bebf9f9def96ef04b4069322
SHA144d9979dd657ac7038f98cb68e4a68f95190d1d8
SHA256cdd6df5224a715af8fbcd8fa573ac7957c2632c6eccf1cc2278a08eba450360e
SHA512f382c2de2c43187c417fbb20238d82fc893592c55c9c1a7883905f5274399457e7d50d491ce07b446bf2b4aa2dacabd39cf15f833fc9d8cc675963c2b3b9dd1d
-
\Users\Admin\AppData\Local\Temp\GLk.exeFilesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
\Users\Admin\AppData\Local\Temp\HD_b2b932bd02b0f2511db8b5c3b5759dc901ed4ca6446948170ad573fe7df58e9e.exeFilesize
2.3MB
MD55e5b275c606e3c1f6aba6ef699721459
SHA136a5222fc094e4b5132c389632d3253fd01f1130
SHA2560df9cda418c04e4bbbf8efb50fa2be7b02ae72408559b1dfe0efe8c9d08c4b72
SHA5124be9825d6a7a40e9bb0c7e275b15005c87f4bc54a8c08ad17c73cd2141d505329d2500dface014879f0af0213088aecf73fddf4cd24829b43fe8a809b2838835
-
\Windows\SysWOW64\259424280.batFilesize
51KB
MD5f46ddfd4cbcd2928b8c7e63987eefae9
SHA1381fe18f20fa7b91d68a04c06853621f9d710248
SHA256c1f507c1534f54270750a1c0cc9309343da9699bb450d13bca2278155fcd02bb
SHA512de2ab922354047dc2b96decd2d310c6926170821164b3fb027295e5715c082e3c31fd0153988a4b1070a9550b004c078046fde2e1f8ebe53ea52c57e431c026c
-
memory/2864-57-0x0000000000400000-0x000000000064F000-memory.dmpFilesize
2.3MB
-
memory/2864-46-0x0000000005060000-0x00000000052B7000-memory.dmpFilesize
2.3MB
-
memory/2864-44-0x0000000005060000-0x00000000052B7000-memory.dmpFilesize
2.3MB
-
memory/2972-946-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-892-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-912-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-910-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-908-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-906-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-904-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-932-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-930-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-926-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-925-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-922-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-920-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-918-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-902-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-900-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-898-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-896-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-894-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-914-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-890-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-889-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-929-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-948-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-916-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-944-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-942-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-940-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-938-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-936-0x00000000024F0000-0x0000000002601000-memory.dmpFilesize
1.1MB
-
memory/2972-8785-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB
-
memory/2972-48-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB
-
memory/2972-47-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB
-
memory/2972-45-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB
-
memory/2972-59-0x0000000075EC0000-0x0000000075F07000-memory.dmpFilesize
284KB
-
memory/2976-886-0x0000000004F70000-0x00000000051C7000-memory.dmpFilesize
2.3MB
-
memory/2976-17526-0x0000000004F70000-0x00000000051C7000-memory.dmpFilesize
2.3MB
-
memory/2976-885-0x0000000004F70000-0x00000000051C7000-memory.dmpFilesize
2.3MB
-
memory/3752-887-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB
-
memory/3752-17502-0x0000000000400000-0x0000000000657000-memory.dmpFilesize
2.3MB