Analysis
-
max time kernel
1049s -
max time network
869s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
30-06-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
Updated-Ver-v319-04-27.html
Resource
win10-20240404-en
General
-
Target
Updated-Ver-v319-04-27.html
-
Size
7KB
-
MD5
daef02f6b1316ad0e05d17060f1490cc
-
SHA1
31c445c775a89734e75f93f4614dbdc5d7afd59b
-
SHA256
544df7e0b35c825673c785c27e0bdda1f4559e4f3cef72615108d24f15ffbd58
-
SHA512
cb63884b1f8d4815b614e2d68eba192199f5021a2d64c536ff514a8fdbeca0d928cc45013da3d9c00fc3c45b0154d4e8aad0034f9c4894859d0b65d6f81202e5
-
SSDEEP
96:3suWziM8mMAfjmZ/r4N/PJjeIJumKF95RZjieojwXZkDpkqP18Gmf:ut7m5WJjeeu1hkrWf
Malware Config
Extracted
redline
@hersgorid
94.228.166.68:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/5260-3210-0x0000000000400000-0x0000000000450000-memory.dmp family_redline -
Executes dropped EXE 1 IoCs
Processes:
Setup.exepid process 5248 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 5248 set thread context of 5260 5248 Setup.exe RegAsm.exe -
Drops file in Windows directory 6 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exePickerHost.exeMicrosoftEdge.exedescription ioc process File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdgeCP.exe File created C:\Windows\rescache\_merged\3829149121\2365354878.pri PickerHost.exe File created C:\Windows\rescache\_merged\3720402701\1568373884.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5292 5248 WerFault.exe Setup.exe -
Processes:
browser_broker.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdge.exeMicrosoftEdgeCP.exePickerHost.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore\OneTimeCleanup = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones\3 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-Revision = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots PickerHost.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 PickerHost.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\1\MRUListEx = ffffffff PickerHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" PickerHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\NextUpdateDate = "426548174" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\CTLs MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\DynamicCodePolicy = 00000000 MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Explorer\Main\OperationalData = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\HistoryJournalCertificate\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = ef9fae2135cbda01 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mediafire.com\NumberOfSubdoma = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\Total\ = "111" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU PickerHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 PickerHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$WordPress MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\ReadingStorePending = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mediafire.com\Total = "751" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionHigh = "268435456" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FavOrder\SyncIEFirstTimeFullScan = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\DeviceId = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.15063.0\"hypervisor=\"No Hypervisor (No SLAT)\"" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mediafire.com\Total = "0" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\EdpDomStorage MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} PickerHost.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\Wow64-DXFeatureLevel = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" PickerHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionLow = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Explorer\DOMStorage\mediafire.com\Total = "111" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DataStore MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = d3cca43435cbda01 MicrosoftEdge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance PickerHost.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 0000000001000000ffffffff PickerHost.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\DynamicCodePolicy = 05000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" PickerHost.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Content\CachePrefix MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\004\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 PickerHost.exe -
NTFS ADS 1 IoCs
Processes:
browser_broker.exedescription ioc process File opened for modification C:\Users\Admin\Desktop\Archived.rar.hxlr8dn.partial:Zone.Identifier browser_broker.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
RegAsm.exepid process 5260 RegAsm.exe 5260 RegAsm.exe 5260 RegAsm.exe 5260 RegAsm.exe 5260 RegAsm.exe 5260 RegAsm.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PickerHost.exepid process 1300 PickerHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MicrosoftEdgeCP.exepid process 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
MicrosoftEdgeCP.exeMicrosoftEdgeCP.exe7zG.exe7zG.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 3272 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3272 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3272 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3272 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 3016 MicrosoftEdgeCP.exe Token: SeRestorePrivilege 3148 7zG.exe Token: 35 3148 7zG.exe Token: SeSecurityPrivilege 3148 7zG.exe Token: SeSecurityPrivilege 3148 7zG.exe Token: SeRestorePrivilege 2332 7zG.exe Token: 35 2332 7zG.exe Token: SeSecurityPrivilege 2332 7zG.exe Token: SeSecurityPrivilege 2332 7zG.exe Token: SeDebugPrivilege 5260 RegAsm.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
7zG.exe7zG.exepid process 3148 7zG.exe 2332 7zG.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exePickerHost.exepid process 4684 MicrosoftEdge.exe 4740 MicrosoftEdgeCP.exe 3272 MicrosoftEdgeCP.exe 4740 MicrosoftEdgeCP.exe 1300 PickerHost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
MicrosoftEdgeCP.exeSetup.exedescription pid process target process PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 3016 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 4740 wrote to memory of 2908 4740 MicrosoftEdgeCP.exe MicrosoftEdgeCP.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe PID 5248 wrote to memory of 5260 5248 Setup.exe RegAsm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\LaunchWinApp.exe"C:\Windows\system32\LaunchWinApp.exe" "C:\Users\Admin\AppData\Local\Temp\Updated-Ver-v319-04-27.html"1⤵
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
- NTFS ADS
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies registry class
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap24727:74:7zEvent283741⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Archived\" -ad -an -ai#7zMap13226:74:7zEvent175501⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Archived\Setup.exe"C:\Users\Admin\Desktop\Archived\Setup.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5248 -s 6482⤵
- Program crash
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
14KB
MD537f8b01c27b2eb1cd1ad31b08b7b6742
SHA1029d453e59707e87a5c12c7c7be919fad1d30793
SHA25611d8c0d3e5d313434a30cc09fc546b783c45f6d7fbf3a6a82e143b6b94fe1396
SHA5129bebfd146104388a49729b40a170c76b05acbc0f3c9e8536959c74d5fdc3a6c9e4ba4a87eec0724d3dd98756023d04e4cf6640594545868ff2dd148786c5eaac
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\L5P12AEX\edgecompatviewlist[1].xmlFilesize
74KB
MD5d4fc49dc14f63895d997fa4940f24378
SHA13efb1437a7c5e46034147cbbc8db017c69d02c31
SHA256853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1
SHA512cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\GFN7VJDV\www.mediafire[1].xmlFilesize
13B
MD5c1ddea3ef6bbef3e7060a1a9ad89e4c5
SHA135e3224fcbd3e1af306f2b6a2c6bbea9b0867966
SHA256b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db
SHA5126be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\GFN7VJDV\www.mediafire[1].xmlFilesize
1KB
MD591c5401f140216840d0248eecc3e17d1
SHA14f53f5374e99bd4ec1f0f4be71336ad712887541
SHA256e07632ece0ca827cb4141350958db0140b930f6da2fabb7ba2ba451221478de1
SHA512f2443bf2384e9c06dd233bf077eadc7a3be4644b4844502664eda72d6197fb97d9d0d4063ea1baf835e13e67524986dec819fc4d3d27c58afec2330353616040
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\4RWS5CSS\suggestions[1].en-USFilesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\NVYB3WZ7\favicon[1].icoFilesize
10KB
MD5a301c91c118c9e041739ad0c85dfe8c5
SHA1039962373b35960ef2bb5fbbe3856c0859306bf7
SHA256cdc78cc8b2994712a041a2a4cb02f488afbab00981771bdd3a8036c2dddf540f
SHA5123a5a2801e0556c96574d8ab5782fc5eab0be2af7003162da819ac99e0737c8876c0db7b42bb7c149c4f4d9cfe61d2878ff1945017708f5f7254071f342a6880a
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
4KB
MD51bfe591a4fe3d91b03cdf26eaacd8f89
SHA1719c37c320f518ac168c86723724891950911cea
SHA2569cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8
SHA51202f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db
-
C:\Users\Admin\AppData\Local\Packages\microsoft.microsoftedge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\94QRFRGU\Archived[1].rarFilesize
32KB
MD562dc6d41bcb3ac2d9919bc60d56cfcb8
SHA167bc4375bae4966306e93d6ac7e3700abd249792
SHA256badab1bd2b9e60f02cf0abfa8c361c9e01bc5ceaaebab1f6974b78fc69c642fa
SHA51214603c9c6e63aa3ced48fc0e6fdfd1835aa5789568188b290fd4d88146facfca3c7d853754db2e6cf8a800913451ea7016a6e42437e05179d676c0278e32d98d
-
C:\Users\Admin\Desktop\Archived.rar.hxlr8dn.partialFilesize
49.2MB
MD577b9a95c60cde62779e3f0529784e5ab
SHA1417f2c93af7205f0005a969706e10b3dd52528d1
SHA25679e710d53964ea8876aa2b385576ad2ab0b13065f0a146f1711c16ba3ef41d0b
SHA51242298290641d8cddf0a30a6c72d6713efc4ab7f41869181c49d1416d75e16d1600d1c1a1a46226539a8745c35b77b2686d9f8c518d8e1781eec6c24fb493a79e
-
C:\Users\Admin\Desktop\Archived\Setup.exeFilesize
500KB
MD5523b68fbf40f8f2735a280c4cddaebb2
SHA15b94c5e72ec15b22709b5b8ad20cf9d7e3393456
SHA256f263b69e857fa6ef99906028fb4755aa02134fc6b6462895206a285dff00ab5c
SHA51263feb15a45f0668ab14da9ed0a78f85f74d6511b72e36899ac815208c76c15c6e76024456d633208ee131c73b980d070c4a2c50136b5876a40551c97687545c3
-
C:\Users\Admin\Desktop\Archived\css\fonts\Open-Sans\generator_config.txtFilesize
720B
MD51064c6f4385932ff89befbd918912a0e
SHA10dd2238d662f7a72017a9be4087fe0475a95133e
SHA256fb649287303416e9d2019b86fa1d1e8ff68f7d2be0dc25c4bf79d0c7fc4937a4
SHA512da157d06168aaafa5658844cae8ee933aaae8e2bbfaf079700094caad2658e983d48a72df4cb7528280260e0e0d0e63eda40d6ff8346fc378ded62d170a128c0
-
C:\Users\Admin\Desktop\Archived\graphics\btnOvrOffRight.tgaFilesize
444B
MD589cb2bc5ccdab01b0653d4dbb3d6a062
SHA1afb947fffd5f5f3723e0c8c3b52cb8cbff406ee9
SHA256ecd13153d9d438809a38de30f3abbb0f6f92837a7e3cacb442a9a9309bcd78d9
SHA512e5bef83bfad930e2b68720e00d450aa879619dcabcf8d96f9f8c47636a95a9662bc91b04cfa9160081d8af79a1257b75647d89677123f28b8c609808d5b86653
-
C:\Users\Admin\Desktop\Archived\graphics\[email protected]Filesize
6KB
MD55a5715177822e69c98aab578421ae78f
SHA1175ea27d6ef6df27fae93a724c94b2c770f78205
SHA2565afc5816946e0d7b6d57a99a60be71d9e88670d9a63c18e249c9266d8e95cd2f
SHA512b11d05dff7f9ce55c2b30de82709f5aa9b410734e1b88a6879e3489394a5b36a27389022de0a741a16f70d0639439d4f75942c3fd604567d63b9ec229d86b331
-
C:\Users\Admin\Desktop\Archived\graphics\html_lock_disabled.tgaFilesize
14KB
MD50a9594013ed88e0ef4f33f8e923a5a29
SHA152fa6265060d744d208b1c21dffc58dcb8cf7c52
SHA256a7d51b286ceeb535d4de432d9c98ed38ba1bce04a3b4f467918a893babbc8606
SHA51291c577456726bbfbf0e97e9add3df87286fce7965eaa9bcae91ce6888dd1957868264d1d2a0c91e48f78f4dd53dbbe534613de14b6b82e9bfba3f3741a13ab58
-
C:\Users\Admin\Desktop\Archived\graphics\[email protected]Filesize
15KB
MD5197451ccba3445f0649ea70af2478b67
SHA1d5d8870de59dd92b2689bba27aee85f85211fe7b
SHA256d3af480fe975487ea4754c88dd56df0d4cfe68633eb9abb2458f42ae3df34479
SHA512348b98e050c6f9525e3a6aa291e4da9b30542e62d229e002b0e325e6d967903d18d853eb9eaa460eb152f3add3583e7fdf3b69d48f024a830ad929878b12f651
-
C:\Users\Admin\Desktop\Archived\graphics\icon_button_friends_mouseover.tgaFilesize
20KB
MD54231435f1957759057ec02169c20a2ff
SHA1aa27d01fff4e986558acf8f056695d6b5a0f273e
SHA25606edfe142eb6977cd123109b040dd19e5af92aa7399d876a3e2bfd5b03cc2117
SHA512cf4bac853a388625a44cce4b4818201989fcd01abe044bee5a5aa8d523f1f73c8e35eb1d0108d7442aa6ef287fe10a37028566792f03447d85a9611a6c322de9
-
C:\Users\Admin\Desktop\Archived\graphics\[email protected]Filesize
92KB
MD557200ac4f495266f043f6d2c602b35a8
SHA1da7b499312cfbfb32ef8966945cd84a32b971387
SHA256f200aca23ac6739a6d521298094972383f835d8fcac24b7bdef820181ae8c37a
SHA5125c5b6b729db7874605901519ab7a0e5701550b5aa909b0f9124ce4d5ed8d1370993806f7b70e71e6c93e79e84e7ba40d007c6942951ac49cfef3a9dd75ed50a9
-
C:\Users\Admin\Desktop\Archived\graphics\tabStdRight.tgaFilesize
48B
MD5bd64c051ae2410eef96839a3cb7297f7
SHA195a5b0455d69127fe50e396153c795d9914ce0d4
SHA2565caa5fa3e79dcd8ec5ec20256ed7c77efaae77e0ae8d89e4a974c484cb177d84
SHA512ea2f76c8cf5dc2fd15017ad9b942d020c3ad5ce1cedc2a1604137ea02f8411cfff4166ffe93c101756b404344488b304cf2b4a71c25b2929654dda9a88a88793
-
memory/2908-146-0x0000015E14FC0000-0x0000015E14FE0000-memory.dmpFilesize
128KB
-
memory/2908-264-0x0000015E15F50000-0x0000015E15F70000-memory.dmpFilesize
128KB
-
memory/2908-322-0x0000015E14200000-0x0000015E14300000-memory.dmpFilesize
1024KB
-
memory/2908-100-0x0000015E04000000-0x0000015E04100000-memory.dmpFilesize
1024KB
-
memory/2908-298-0x0000015E16700000-0x0000015E16800000-memory.dmpFilesize
1024KB
-
memory/2908-357-0x0000015E15D10000-0x0000015E15D12000-memory.dmpFilesize
8KB
-
memory/2908-361-0x0000015E161F0000-0x0000015E161F2000-memory.dmpFilesize
8KB
-
memory/2908-364-0x0000015E16410000-0x0000015E16412000-memory.dmpFilesize
8KB
-
memory/2908-370-0x0000015E164E0000-0x0000015E164E2000-memory.dmpFilesize
8KB
-
memory/2908-367-0x0000015E164D0000-0x0000015E164D2000-memory.dmpFilesize
8KB
-
memory/2908-359-0x0000015E161B0000-0x0000015E161B2000-memory.dmpFilesize
8KB
-
memory/2908-387-0x0000015E1A400000-0x0000015E1A420000-memory.dmpFilesize
128KB
-
memory/2908-455-0x0000015E19CF0000-0x0000015E19CF2000-memory.dmpFilesize
8KB
-
memory/2908-472-0x0000015E19B20000-0x0000015E19B40000-memory.dmpFilesize
128KB
-
memory/3016-63-0x0000028FFF600000-0x0000028FFF602000-memory.dmpFilesize
8KB
-
memory/3016-61-0x0000028FFF4E0000-0x0000028FFF4E2000-memory.dmpFilesize
8KB
-
memory/3016-67-0x0000028FFF6E0000-0x0000028FFF6E2000-memory.dmpFilesize
8KB
-
memory/3016-81-0x0000028FFF7A0000-0x0000028FFF7A2000-memory.dmpFilesize
8KB
-
memory/3016-55-0x0000028FEE8C0000-0x0000028FEE8C2000-memory.dmpFilesize
8KB
-
memory/3016-57-0x0000028FEE8E0000-0x0000028FEE8E2000-memory.dmpFilesize
8KB
-
memory/3016-59-0x0000028FFF4C0000-0x0000028FFF4C2000-memory.dmpFilesize
8KB
-
memory/3016-65-0x0000028FFF6C0000-0x0000028FFF6C2000-memory.dmpFilesize
8KB
-
memory/3272-44-0x000002210EE00000-0x000002210EF00000-memory.dmpFilesize
1024KB
-
memory/4684-338-0x0000017233B10000-0x0000017233B11000-memory.dmpFilesize
4KB
-
memory/4684-337-0x0000017232A70000-0x0000017232A71000-memory.dmpFilesize
4KB
-
memory/4684-0-0x000001722DF20000-0x000001722DF30000-memory.dmpFilesize
64KB
-
memory/4684-35-0x000001722D000000-0x000001722D002000-memory.dmpFilesize
8KB
-
memory/4684-16-0x000001722E020000-0x000001722E030000-memory.dmpFilesize
64KB
-
memory/5260-3210-0x0000000000400000-0x0000000000450000-memory.dmpFilesize
320KB
-
memory/5260-3212-0x0000000004FA0000-0x0000000005032000-memory.dmpFilesize
584KB
-
memory/5260-3213-0x00000000050B0000-0x00000000050BA000-memory.dmpFilesize
40KB
-
memory/5260-3214-0x00000000064B0000-0x0000000006AB6000-memory.dmpFilesize
6.0MB
-
memory/5260-3216-0x0000000006410000-0x0000000006422000-memory.dmpFilesize
72KB
-
memory/5260-3215-0x0000000007C80000-0x0000000007D8A000-memory.dmpFilesize
1.0MB
-
memory/5260-3217-0x0000000006470000-0x00000000064AE000-memory.dmpFilesize
248KB
-
memory/5260-3218-0x0000000007D90000-0x0000000007DDB000-memory.dmpFilesize
300KB
-
memory/5260-3219-0x00000000088F0000-0x0000000008956000-memory.dmpFilesize
408KB
-
memory/5260-3220-0x0000000008BB0000-0x0000000008C00000-memory.dmpFilesize
320KB
-
memory/5260-3221-0x0000000009CE0000-0x0000000009EA2000-memory.dmpFilesize
1.8MB
-
memory/5260-3222-0x000000000A3E0000-0x000000000A90C000-memory.dmpFilesize
5.2MB
-
memory/5260-3211-0x00000000054A0000-0x000000000599E000-memory.dmpFilesize
5.0MB