Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-11-2024 05:06

General

  • Target

    df3276923c77fda7e3a581b56bf727686608443c0188b54b23781de64e5102c3.exe

  • Size

    2.8MB

  • MD5

    85fd33013e5c7d0c132e37916f6d4d22

  • SHA1

    5b15fc198af5c423859f30a0768e0b6b5c143a44

  • SHA256

    df3276923c77fda7e3a581b56bf727686608443c0188b54b23781de64e5102c3

  • SHA512

    b9e1aa8aaf429f401cc0c87639b59221b104290930b7e3e06c2a74c8a0d56c72809f2cadce518491f405580f83cc7b9816917139c1cccae8daa3a30a4378b0f8

  • SSDEEP

    49152:fsrGlmSlV77N/2zUDwug+TbrgZQly5JJ7nWJSR5BXzzncQPzxwDMuXZ4S:IaN/4UcuXPkcy5jDWWblPVw1Xq

Malware Config

Signatures

  • Luminosity

    Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.

  • Luminosity family
  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 25 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 30 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks system information in the registry 2 TTPs 46 IoCs

    System information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 64 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 37 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df3276923c77fda7e3a581b56bf727686608443c0188b54b23781de64e5102c3.exe
    "C:\Users\Admin\AppData\Local\Temp\df3276923c77fda7e3a581b56bf727686608443c0188b54b23781de64e5102c3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Update\Skype" /XML "C:\Users\Admin\AppData\Local\Temp\aOOOOO.xml"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1900
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe"
        3⤵
        • Executes dropped EXE
        PID:4304
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe"
        3⤵
        • Executes dropped EXE
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe
        "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Executes dropped EXE
        • Adds Run key to start application
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O16INS~1.EXE
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O16INS~1.EXE
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Windows\system32\cmd.exe
        "C:\Windows\Sysnative\cmd.exe" /D /c copy C:\Windows\system32\Tasks\O16Install "\O16Install.tmp" /Y
        3⤵
          PID:4712
        • C:\Windows\system32\cmd.exe
          "C:\Windows\Sysnative\cmd.exe" /D /c files.dat -y -pkmsauto
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3880
          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\files.dat
            files.dat -y -pkmsauto
            4⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            PID:2224
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4676
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2080
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:3380
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:4940
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2004
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:756
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:1448
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4612
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:2492
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious use of SetWindowsHookEx
          PID:4060
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1740
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:3888
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3220
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:5020
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:3052
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4896
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3120
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:2840
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3392
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1916
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:4452
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4028
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4940
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:888
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1892
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1928
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:4488
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3328
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Suspicious use of SetWindowsHookEx
          PID:1212
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:4452
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:1944
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:2220
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:2036
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Configure.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Checks system information in the registry
          • System Location Discovery: System Language Discovery
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:2532
        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Setup.exe" /configure Uninstall.xml
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4536
          • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
            OfficeClickToRun.exe scenario=install productreleaseid="none" platform="x64" cdnbaseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" baseurl="http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60" mediatype="CDN" culture="en-us" version="16.0.12527.20470" b="" lcid="1033" updatesenabled="True" productstoremove="AllProducts"
            4⤵
            • Checks processor information in registry
            • Enumerates system info in registry
            • Suspicious use of SetWindowsHookEx
            PID:1184

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      471B

      MD5

      8b9e5f99f9682b03f26d619511dbfb1a

      SHA1

      07226ebb66356ec8623ca52e6a1ecac0a6763303

      SHA256

      592d66d63eb83e6d8726409de46c3e3aedf40bde52ec37a66049a6a79db0c2de

      SHA512

      c2af4469c83fd3b1e19ab7bd6818d56c7ae471aa0e0259259f86e0cff380a45a5d8c89b849bf3ed17d75ee5528c2f72503ce9408bb33ddec27609b60aaf4258d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

      Filesize

      471B

      MD5

      a696559440c422a661dfaa6bed9d0935

      SHA1

      ea45c7c5e2b6e97335a8987632f1db348ec80b9e

      SHA256

      9dd56eae844af46d240e6baac4443d5fa3b17d9a7070ccc0c885ae578e5509a0

      SHA512

      647b700db14e27ffb1fe3fe0aa1c495f09cd72865d1032d78c9e6c6ba81690431be46a7d0f2aea21e7a77f3162813e3a147243daf8c607a85fbc61346aa77d68

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

      Filesize

      412B

      MD5

      33d0ed101d7924f546e260e5d654fe91

      SHA1

      7ead13011d5f8e7244974ba922384c0ac568caf8

      SHA256

      ec6fd4e24f3b4c1d66802e519b3ddfb35a815e812cb9a11269623d76849495fa

      SHA512

      52c7cd0fccab23cc101bf0ad6e1e983ad3ae00fac99036ac6b5bb84e04fe371b75465273ba6049f154f8008f7c1a18385822f83fdd8154b1dd35143024651200

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

      Filesize

      420B

      MD5

      9a3dc2432a41df2164fb6569c0724736

      SHA1

      465ba7fea32410b619bfacc6ef2d3af803dc3814

      SHA256

      863c7bc7f14d0f8d4bd6de398973e211ad5eb6caf2a49a37ac32bfb8c9c52665

      SHA512

      50066decf33c379e5b7d6099554d84bdd13bf57f8d6d7df87a4eb78f45634808b849d6100cd77648ae6d2df94af365d6c8731306cfa1f392a5da64e291cdfebd

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\skype.exe.log

      Filesize

      312B

      MD5

      023e5d9d5fd0491df718ec4ad9bebd12

      SHA1

      3e9f29444256c26d683c0f3544bcb568084ab082

      SHA256

      2c219f3587282c91af23370457b964104edb704f83fa547eb06cdb2f82049b74

      SHA512

      7864f718ecfda36465868e6794ff813c7541071f1179d3c2dc35d4beac1ad86d66decdfe2ed2a9d02338ccf07a51ac9dcf530a4fcdc6db78e8b17084327b394d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\setup.exe_Rules.xml

      Filesize

      13KB

      MD5

      4161ad6c0580f02d2744f18237096330

      SHA1

      0c4f63b73bf333fd7505ec5cbc086b95216c216d

      SHA256

      7ea4c9e27b91ad103e0581049ef1996cae48797f0ddf884bdd24542126c48f0d

      SHA512

      a5833a5f8d3da8e896538dc78a2b11030022ee4dd73ae7d41ac7ab84b58589e55f6522c5208068533674846eb2c837e25dbb47cd464331bb186415667dca3f1d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      8665de22b67e46648a5a147c1ed296ca

      SHA1

      b289a96fee9fa77dd8e045ae8fd161debd376f48

      SHA256

      b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f

      SHA512

      bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      085ebd119f5fc6b8f63720fac1166ff5

      SHA1

      af066018aadec31b8e70a124a158736aca897306

      SHA256

      b8411fe8ec499074fca9047f6983d920279e84ddf3b02b2dd5c08cf07ec44687

      SHA512

      adb0522830db26123347cb485c43b156f5c888510e52091ba0fafc22b650ad29630c027746c920321905c28259dce7ff63dded93a79efddd5567c68312117875

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      33eea2792b9fa42f418d9d609f692007

      SHA1

      48c3916a14ef2d9609ec4d2887a337b973cf8753

      SHA256

      8f7807c324626abc2d3504638958c148e2e3f3e212261f078940cf4c5f0c4fbb

      SHA512

      b2dbfcdf2599c38c966c5ebce714a5cd50e2f8b411555acf9f02b31b9c29b8ab53a9afa9d32bab87a06e08f8b2c7818d600773f659a058c8af81c50be7f09b95

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      81f7ddbfffbcb29fe5a543b3a1e438b8

      SHA1

      d16b194470fe1404be5d9037fe9bccce3677e58f

      SHA256

      df476fccec8b974e8f602f490220c3674c6c4babf5d8050db2f75e80ce09d076

      SHA512

      9a3b6dab440240cc4ce8c5ab7669cc4d14bdb3013da26760411f099c2a59f6daa42a860eec6c6033378a49355e54a50177b68825d8c912286be49976b22fa101

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      b00f3f56c104c94e03cd2ad8452c14e7

      SHA1

      51b78e45015e0d9d62fbdf31b75a22535a107204

      SHA256

      ba2b669020334ff01a85bfc900ea4371ea557bd315f154875d9bdfdc16ae8b50

      SHA512

      93e1609be5bbb414c285f37432ce93294c3d1583ef46c7c6c570c122f0b166c34b0ad87de708005c8af97dee27923ba53395a34c2563cdadf3c0a708848b3525

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      bb5122013e9da21ebcd7cf8bbfd442d8

      SHA1

      137dc37b75c41a0edca25bc20dab16729c23d5f5

      SHA256

      fa311153c8e26e115ed889e986eabf2c6f96123d7a3a7f89102bfa89321342c3

      SHA512

      6582f6d15a31dcaecc6e6fee0ebb21b6d2278c4b2c1f80580172181d457c47a8be7edb0bc007c701c8a3adc391656ee166a77f49f575539f4f7e5188f5da8a0a

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      fd39de0268d6a6ad214a2bb8e7d04444

      SHA1

      8519ccaaf31ba572e6224e052bd555268e7c205d

      SHA256

      37a1920e52980869d54d3d8affc1a370e9cd947813e51cc4fec909c4ad61a827

      SHA512

      6afbdfa73e5a3e3c4e593ceef2e1f3940d2ec7a40900c5abbc8bf686889ff5b4d5193bef682e8932a750a79b735569779298868f586a6e271eba8670c7002f42

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      e1296dfe2cf3638c45f0ccfe213c538e

      SHA1

      39b2b2ee19a86f9ea0732dc42368a3fcb25862bf

      SHA256

      45a432329d74d9a88aa6173a3e9bc951b52a0fdc0bf3fa2ebeb6413ef3b627e4

      SHA512

      2e1973bbc0723a1fdf859e584b46716ca68c184c2cf4292cdf341697cf9edee1321f05dd807d070becafcaff6bbf18c1da6410e3176aea012c20bcd8f532de56

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      24KB

      MD5

      6f60b13b199ae8351a59df13c18109d5

      SHA1

      954250bb3d7ac1e34da3434ad30b835ea4ec67d7

      SHA256

      668b5f3d8e37d0a65dda3e6c9df96c006e6e48640e95378214ded8776fd1030a

      SHA512

      25a730178a3829e31942e447866c5c26b7d43945149c1b2b82c880fe1aa784b7f2c7815d8b888f117e5e702f6e09c3ae46563b5bf349a4905d3b47970121538a

    • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db

      Filesize

      48KB

      MD5

      650226ffa8a41b1110b6ff5cbfac8706

      SHA1

      ba3951574884e078ed7d773a343ebb262f91c429

      SHA256

      564a9012bb16d0f3cc747ec85375d33bb4adeffc3e2aec2aaa695f63232ae7a1

      SHA512

      d6365c604bc41d517420a3bc1e3a34d1d0d844aa5fa24f11f688f3fdee2fd402881a867c4adab91b9ed4618e5105f8f8c9bc73082b737b7d435056bb59d6b146

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\O16INS~1.EXE

      Filesize

      3.0MB

      MD5

      1bf0d61f0561abd2282199a6fb7fb8d7

      SHA1

      03ae99b9f018cc6e48c6a8a5fd25e751c80f3e0f

      SHA256

      e7c3d4a6f93ef4a551052ec7330a9aba4bebe9923acc4624b6b52a5c6f8228aa

      SHA512

      9e245bc03a7d4da6eb8db75c13d364b7af0df20b438a585ff6ef32ca6892227d08bf70c365bbc8bc1a4252b3745203dea48cb815df60de10ab52e74335e5f56d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Configure.xml

      Filesize

      366B

      MD5

      ac6be84084e31dbb0e08d188b6c86ec8

      SHA1

      5c17b1cdefb781993c6f80f2ed292a56703a239b

      SHA256

      1879f7de537c2aa70292c61ebef9c6477d36e25b2e6a639e318b159e0a22b0fc

      SHA512

      a6eb09c3020444d50a3b00d0f7de487e9536f20d83159d23cbc121adfdd2b041199b7d94e4c00cda2fe9e3d0c0cdd05af987855c8b19f0b2985e322c9838ac36

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Configure.xml

      Filesize

      273B

      MD5

      2b32cc89dfc92f94e0be8ece26d9367c

      SHA1

      52e7d48896ed6b0ef37106da3813c39d378dc45a

      SHA256

      150fb7c32d4aa311da3755c35cc936b6cf7da6b431c706e858f6522f9b87b99a

      SHA512

      4910d04da1d3d001b81dff2c929e3ca0fc99852cfae1b754d1d8d4ab2ef0d7ca7ac0894ffffea8196bedc9825caaaf13f28fec019a41a456c6a6c7fcc6b3cb66

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Configure.xml

      Filesize

      358B

      MD5

      51f27f2bffcb42875624a4cea1bcb97d

      SHA1

      da2c55bf69add0b937e5ba4dfbe5bbfcdad4f518

      SHA256

      ec81a138618b400fcd3c5db8ac263b989315472dd5cda8cf0b64f297ee005795

      SHA512

      3c455d1983a45246e03db2001e5336b6e671fb542f1406c9a9051f56dc1f646d6c25242edb0086738dcd0a16aaf42336512a9d63268823004ed08dac3b36ed9b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\Uninstall.xml

      Filesize

      59B

      MD5

      364f86f97324ea82fe0d142cd01cf6dd

      SHA1

      fc2a45da2ede0c018ab8e46044e6a25765c27d99

      SHA256

      09d5b42140bab13165ba97fbd0e77792304c3c93555be02c3dce21a7a69c66dd

      SHA512

      9b0a0944535e25c944e01bed1674efff119505292b176287c0dad3db70ffc4244cff21cccfd1fd94b09dd6d5f84221930b66b210101e482cc4bb5df3311a5fdf

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\files.dat

      Filesize

      1.9MB

      MD5

      68cb3a8ee709d7aa9ebd714883d4169b

      SHA1

      5b391ee0fb1621b61b3d637c5ae83e39a78d2a7a

      SHA256

      8985491ef0aa360b0e85192e5e1b720bf5e2262c6f344a8a84da80591fb07305

      SHA512

      4ef7e87025193316e5b5d0cc1cf898849cb44db405a68128948ae8dd1e755e1494805c7f8804e06d6d8619dcdfef27266157a5a5f9401f478bbce31c803c9bbc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\files\setup.exe

      Filesize

      2.8MB

      MD5

      7999e9a1000078ae7a5e71609732cba8

      SHA1

      34b009d8dd8a25a7103907ba6f058c8f76589e1f

      SHA256

      a4f073964153e0f99d2c3c2b01f19322f84a17c5f3834cebb3112f116149ae35

      SHA512

      dd03f0d1436751857bf6e18c8e36b48a14c41ab220be381be836aedd8ffb3a7dc18793c3bb0323beb4662963b1ff3d58c462b97c170b9e59c19bc8f0d4cfc2e7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\skype.exe

      Filesize

      339KB

      MD5

      8bf4e9352ba53700635f4d2134011419

      SHA1

      1e5d2560327b6c2dbf5c37e935f4288aeb26cb81

      SHA256

      d0cb14db634dbe2a3395a59af13942e5ad5437eb3da7c78eb4e6847035a06a29

      SHA512

      6e19a6951be4eec5db0279129ad9ea6cbcf5357a5f8ce8e06dbd57e985b9d384c3ed58783729378d8f519ede63e31cf69d0fb0d23a2113f74ae0e7c8fa69a736

    • C:\Users\Admin\AppData\Local\Temp\OFFICE~1\v32.cab

      Filesize

      11KB

      MD5

      6419f779d1d7475f3ccd42eb1986aa24

      SHA1

      d8ed16627517476e7ec30a47985e42c36fbceed6

      SHA256

      a2dee4bdbece3f151aaa008d9d612f9d0b373c9f57d944e3eae88aabe393420a

      SHA512

      af7a5dbb482c3d372a4848cb742327811b0b7d63c6fbff0e7f32eeefe88d5af25459603800529ab0fa280f01ba45545b25620ce5f21fa75dc54aec03c07d4135

    • C:\Users\Admin\AppData\Local\Temp\OfficeC2R13A7802E-E52C-4566-BA63-222D0EB7FCE3OfficeC2R97A20083-F828-42EE-A10E-C4167E4C2EC7\v32.hash

      Filesize

      106B

      MD5

      8874e6cd3845de0b50a810e2c53a62cf

      SHA1

      5d16aa2bc1ac0bdc650226e6a7799f0a54c29a07

      SHA256

      40c4d873a165f185e2011480370b1f630f3eaffb9f1295be55e5c83c44e6e364

      SHA512

      e7480c113477e4a88da3fad4757b8eeca8abae4d30bb070d344b47d1d1f43f1e879218adbdcc6bca9476bd7c71f0af57202ada6470bcf7a5dd3d5c8c989eeb32

    • C:\Users\Admin\AppData\Local\Temp\OfficeC2R2F6FB6EC-92E6-4A93-9238-1592DD8DB5F7\VersionDescriptor.xml

      Filesize

      25KB

      MD5

      162d1dc406cf79ebdd18416cf7be516c

      SHA1

      73c9a09ffb356488dd7b95030ea09f8b5cce0d9d

      SHA256

      30fb8540444c8a47c9198e3acbbee744fa013211f454053810133fb49ebbe930

      SHA512

      f33b093e4a7add7693731efc077c22a5856ae20707455239e9381dcdb9b2aba42bfb033864541d7d25cc28e5521d382a15266535c60d20c9ca7790f3941a5725

    • C:\Users\Admin\AppData\Local\Temp\aOOOOO.xml

      Filesize

      1KB

      MD5

      8ca72acc1c9499dd0736b628ffc20853

      SHA1

      3f128c7ff5095c7ab0c57690896cde34876e438a

      SHA256

      93ce267b1bdd0acb26a50bdb318897f87e22510f6b1bdc93d47bce9cd8b1ca59

      SHA512

      133c43178b170412494fcd071bc0c6602dd8e7fc7d129abfd319d66bac4e7ff536010f810cb5013d6671ae62a5e3eb84f504f8e1d04ae723831a5dc19a2a649d

    • memory/1448-169-0x0000000006800000-0x0000000006817000-memory.dmp

      Filesize

      92KB

    • memory/1448-174-0x0000000006800000-0x0000000006817000-memory.dmp

      Filesize

      92KB

    • memory/1448-171-0x0000000006800000-0x0000000006817000-memory.dmp

      Filesize

      92KB

    • memory/1448-170-0x0000000004B20000-0x0000000004B21000-memory.dmp

      Filesize

      4KB

    • memory/1448-168-0x0000000006800000-0x0000000006817000-memory.dmp

      Filesize

      92KB

    • memory/1448-167-0x0000000006800000-0x0000000006817000-memory.dmp

      Filesize

      92KB

    • memory/1740-228-0x0000000003900000-0x0000000003917000-memory.dmp

      Filesize

      92KB

    • memory/1740-244-0x0000000003900000-0x0000000003917000-memory.dmp

      Filesize

      92KB

    • memory/1740-231-0x0000000003900000-0x0000000003917000-memory.dmp

      Filesize

      92KB

    • memory/1740-229-0x0000000003900000-0x0000000003917000-memory.dmp

      Filesize

      92KB

    • memory/1740-230-0x00000000035E0000-0x00000000035E1000-memory.dmp

      Filesize

      4KB

    • memory/1740-227-0x0000000003900000-0x0000000003917000-memory.dmp

      Filesize

      92KB

    • memory/2004-144-0x0000000003180000-0x0000000003197000-memory.dmp

      Filesize

      92KB

    • memory/2004-130-0x0000000003180000-0x0000000003197000-memory.dmp

      Filesize

      92KB

    • memory/2004-128-0x0000000003180000-0x0000000003197000-memory.dmp

      Filesize

      92KB

    • memory/2004-132-0x0000000003180000-0x0000000003197000-memory.dmp

      Filesize

      92KB

    • memory/2004-129-0x0000000003180000-0x0000000003197000-memory.dmp

      Filesize

      92KB

    • memory/2004-131-0x0000000002C70000-0x0000000002C71000-memory.dmp

      Filesize

      4KB

    • memory/3184-7-0x0000000074B42000-0x0000000074B43000-memory.dmp

      Filesize

      4KB

    • memory/3184-8-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3184-9-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3184-22-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/3220-274-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/3220-265-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/3220-266-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/3220-268-0x0000000004790000-0x0000000004791000-memory.dmp

      Filesize

      4KB

    • memory/3220-267-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/3220-269-0x0000000006490000-0x00000000064A7000-memory.dmp

      Filesize

      92KB

    • memory/4056-89-0x0000000002920000-0x0000000002937000-memory.dmp

      Filesize

      92KB

    • memory/4056-87-0x0000000002920000-0x0000000002937000-memory.dmp

      Filesize

      92KB

    • memory/4056-91-0x0000000002920000-0x0000000002937000-memory.dmp

      Filesize

      92KB

    • memory/4056-90-0x0000000002940000-0x0000000002941000-memory.dmp

      Filesize

      4KB

    • memory/4056-88-0x0000000002920000-0x0000000002937000-memory.dmp

      Filesize

      92KB

    • memory/4060-216-0x0000000006680000-0x0000000006697000-memory.dmp

      Filesize

      92KB

    • memory/4060-218-0x0000000006680000-0x0000000006697000-memory.dmp

      Filesize

      92KB

    • memory/4060-220-0x0000000006680000-0x0000000006697000-memory.dmp

      Filesize

      92KB

    • memory/4060-225-0x0000000006680000-0x0000000006697000-memory.dmp

      Filesize

      92KB

    • memory/4060-219-0x00000000049A0000-0x00000000049A1000-memory.dmp

      Filesize

      4KB

    • memory/4060-217-0x0000000006680000-0x0000000006697000-memory.dmp

      Filesize

      92KB

    • memory/4460-15-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4460-23-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4460-24-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4460-76-0x0000000074B40000-0x00000000750F1000-memory.dmp

      Filesize

      5.7MB

    • memory/4460-17-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4612-178-0x0000000003CE0000-0x0000000003CF7000-memory.dmp

      Filesize

      92KB

    • memory/4612-179-0x0000000003CE0000-0x0000000003CF7000-memory.dmp

      Filesize

      92KB

    • memory/4612-195-0x0000000003CE0000-0x0000000003CF7000-memory.dmp

      Filesize

      92KB

    • memory/4612-182-0x0000000003CE0000-0x0000000003CF7000-memory.dmp

      Filesize

      92KB

    • memory/4612-180-0x0000000003CE0000-0x0000000003CF7000-memory.dmp

      Filesize

      92KB

    • memory/4612-181-0x0000000003A80000-0x0000000003A81000-memory.dmp

      Filesize

      4KB

    • memory/4940-121-0x0000000006240000-0x0000000006257000-memory.dmp

      Filesize

      92KB

    • memory/4940-119-0x0000000006240000-0x0000000006257000-memory.dmp

      Filesize

      92KB

    • memory/4940-122-0x0000000004480000-0x0000000004481000-memory.dmp

      Filesize

      4KB

    • memory/4940-120-0x0000000006240000-0x0000000006257000-memory.dmp

      Filesize

      92KB

    • memory/4940-123-0x0000000006240000-0x0000000006257000-memory.dmp

      Filesize

      92KB

    • memory/4940-126-0x0000000006240000-0x0000000006257000-memory.dmp

      Filesize

      92KB

    • memory/5020-276-0x0000000003C40000-0x0000000003C57000-memory.dmp

      Filesize

      92KB

    • memory/5020-277-0x0000000003C40000-0x0000000003C57000-memory.dmp

      Filesize

      92KB

    • memory/5020-278-0x0000000003C40000-0x0000000003C57000-memory.dmp

      Filesize

      92KB

    • memory/5020-279-0x00000000035E0000-0x00000000035E1000-memory.dmp

      Filesize

      4KB