Overview
overview
10Static
static
8Heart-Send...ig.bat
windows7_x64
10Heart-Send...ig.bat
windows10_x64
10Heart-Send...ck.dll
windows7_x64
1Heart-Send...ck.dll
windows10_x64
1Heart-Send...ad.exe
windows7_x64
3Heart-Send...ad.exe
windows10_x64
1Heart-Send...er.exe
windows7_x64
9Heart-Send...er.exe
windows10_x64
9Heart-Send...r1.exe
windows7_x64
9Heart-Send...r1.exe
windows10_x64
9Heart-Send...ye.exe
windows7_x64
10Heart-Send...ye.exe
windows10_x64
10Heart-Send...ck.dll
windows7_x64
1Heart-Send...ck.dll
windows10_x64
1Heart-Send...ad.exe
windows7_x64
1Heart-Send...ad.exe
windows10_x64
1Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-03-2021 13:55
Static task
static1
Behavioral task
behavioral1
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Config.bat
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Config.bat
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/HtmlAgilityPack.dll
Resource
win7v20201028
Behavioral task
behavioral4
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/HtmlAgilityPack.dll
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/Load.exe
Resource
win7v20201028
Behavioral task
behavioral6
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Heart/Load.exe
Resource
win10v20201028
Behavioral task
behavioral7
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader.exe
Resource
win7v20201028
Behavioral task
behavioral8
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader.exe
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader1.exe
Resource
win7v20201028
Behavioral task
behavioral10
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Config/Loader1.exe
Resource
win10v20201028
Behavioral task
behavioral11
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
Resource
win7v20201028
Behavioral task
behavioral12
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/HtmlAgilityPack.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/HtmlAgilityPack.dll
Resource
win10v20201028
Behavioral task
behavioral15
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Load.exe
Resource
win7v20201028
Behavioral task
behavioral16
Sample
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Load.exe
Resource
win10v20201028
General
-
Target
Heart-Sender-V1.2_Cracked_by_JC0der-FireEye/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe
Malware Config
Extracted
njrat
0.7d
HacKedTEST
chipo.publicvm.com:1177
4c71585ab01a8f1344352fb1f26b00fd
-
reg_key
4c71585ab01a8f1344352fb1f26b00fd
-
splitter
|'|'|
Extracted
quasar
1.3.0.0
Heart
185.163.127.20:61110
HRT_MUTEX_kecTsVDPnERdvianlr
-
encryption_key
3vnM9JqtaSdxUVqeTXSi
-
install_name
Subfile.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
Quasar Client Startup
-
subdirectory
SubDirr
Signatures
-
Quasar Payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe family_quasar C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe family_quasar -
ACProtect 1.3x - 1.4x DLL software 7 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Program Files\Common Files\System\symsrv.dll acprotect C:\Program Files\Common Files\System\symsrv.dll acprotect \Program Files\Common Files\System\symsrv.dll acprotect \Program Files\Common Files\System\symsrv.dll acprotect \Program Files\Common Files\System\symsrv.dll acprotect \Program Files\Common Files\System\symsrv.dll acprotect \Program Files\Common Files\System\symsrv.dll acprotect -
Executes dropped EXE 5 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exetest404.exeGoogle Chrome.exeSys32.exeSubfile.exepid process 1192 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe 824 test404.exe 684 Google Chrome.exe 1056 Sys32.exe 612 Subfile.exe -
Modifies AppInit DLL entries 2 TTPs
-
Modifies Windows Firewall 1 TTPs
-
Processes:
resource yara_rule \Program Files\Common Files\System\symsrv.dll upx \Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe upx C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe upx C:\Program Files\Common Files\System\symsrv.dll upx \Program Files\Common Files\System\symsrv.dll upx \Program Files\Common Files\System\symsrv.dll upx C:\Users\Admin\AppData\Local\Temp\A1D26E2\BC4D3D0778.tmp upx \Program Files\Common Files\System\symsrv.dll upx C:\Users\Admin\AppData\Local\Temp\A1D26E2\BF2A52468C.tmp upx \Program Files\Common Files\System\symsrv.dll upx \Program Files\Common Files\System\symsrv.dll upx -
Drops startup file 2 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test404.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\test404.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe -
Loads dropped DLL 9 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exeLoader.exeLoader1.exetest404.exeGoogle Chrome.exeSubfile.exenetsh.exepid process 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe 1912 Loader.exe 1676 Loader1.exe 824 test404.exe 684 Google Chrome.exe 612 Subfile.exe 112 netsh.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
Google Chrome.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\4c71585ab01a8f1344352fb1f26b00fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Google Chrome.exe\" .." Google Chrome.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\4c71585ab01a8f1344352fb1f26b00fd = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Google Chrome.exe\" .." Google Chrome.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Subfile.exedescription ioc process File opened (read-only) \??\e: Subfile.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 7 ip-api.com -
autoit_exe 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\A1D26E2\7A5E44C63C.tmp autoit_exe -
Drops file in Program Files directory 2 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exeSubfile.exedescription ioc process File created C:\Program Files\Common Files\System\symsrv.dll Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe File created \??\c:\progra~1\common~1\system\symsrv.dll.000 Subfile.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
Processes:
Loader.exeLoader1.exepid process 1912 Loader.exe 1676 Loader1.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exepowershell.exepowershell.exeSubfile.exepid process 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe 1964 powershell.exe 1964 powershell.exe 1768 powershell.exe 1768 powershell.exe 612 Subfile.exe 612 Subfile.exe -
Suspicious use of AdjustPrivilegeToken 38 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exepowershell.exepowershell.exeLoader.exeLoader1.exeGoogle Chrome.exeSubfile.exenetsh.exedescription pid process Token: SeDebugPrivilege 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 1768 powershell.exe Token: SeDebugPrivilege 1912 Loader.exe Token: SeDebugPrivilege 1676 Loader1.exe Token: SeDebugPrivilege 684 Google Chrome.exe Token: SeDebugPrivilege 612 Subfile.exe Token: SeDebugPrivilege 112 netsh.exe Token: SeDebugPrivilege 612 Subfile.exe Token: SeDebugPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe Token: 33 684 Google Chrome.exe Token: SeIncBasePriorityPrivilege 684 Google Chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Subfile.exepid process 612 Subfile.exe -
Suspicious use of WriteProcessMemory 63 IoCs
Processes:
Heart-Sender-V1.2 Cracked by JC0der-FireEye.exeHeart-Sender-V1.2 Cracked by JC0der-FireEye.exewscript.execmd.exetest404.exetaskeng.exeGoogle Chrome.exedescription pid process target process PID 1596 wrote to memory of 1192 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe PID 1596 wrote to memory of 1192 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe PID 1596 wrote to memory of 1192 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe PID 1596 wrote to memory of 1192 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe PID 1192 wrote to memory of 2008 1192 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe wscript.exe PID 1192 wrote to memory of 2008 1192 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe wscript.exe PID 1192 wrote to memory of 2008 1192 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe wscript.exe PID 1192 wrote to memory of 2008 1192 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe wscript.exe PID 1596 wrote to memory of 824 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe test404.exe PID 1596 wrote to memory of 824 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe test404.exe PID 1596 wrote to memory of 824 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe test404.exe PID 1596 wrote to memory of 824 1596 Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe test404.exe PID 2008 wrote to memory of 1732 2008 wscript.exe Load.exe PID 2008 wrote to memory of 1732 2008 wscript.exe Load.exe PID 2008 wrote to memory of 1732 2008 wscript.exe Load.exe PID 2008 wrote to memory of 1732 2008 wscript.exe Load.exe PID 2008 wrote to memory of 1080 2008 wscript.exe cmd.exe PID 2008 wrote to memory of 1080 2008 wscript.exe cmd.exe PID 2008 wrote to memory of 1080 2008 wscript.exe cmd.exe PID 1080 wrote to memory of 1964 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1964 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1964 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1768 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1768 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1768 1080 cmd.exe powershell.exe PID 1080 wrote to memory of 1300 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1300 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1300 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 364 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 364 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 364 1080 cmd.exe schtasks.exe PID 1080 wrote to memory of 1144 1080 cmd.exe attrib.exe PID 1080 wrote to memory of 1144 1080 cmd.exe attrib.exe PID 1080 wrote to memory of 1144 1080 cmd.exe attrib.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1912 1080 cmd.exe Loader.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 1080 wrote to memory of 1676 1080 cmd.exe Loader1.exe PID 824 wrote to memory of 684 824 test404.exe Google Chrome.exe PID 824 wrote to memory of 684 824 test404.exe Google Chrome.exe PID 824 wrote to memory of 684 824 test404.exe Google Chrome.exe PID 824 wrote to memory of 684 824 test404.exe Google Chrome.exe PID 1696 wrote to memory of 1056 1696 taskeng.exe Sys32.exe PID 1696 wrote to memory of 1056 1696 taskeng.exe Sys32.exe PID 1696 wrote to memory of 1056 1696 taskeng.exe Sys32.exe PID 1696 wrote to memory of 612 1696 taskeng.exe Subfile.exe PID 1696 wrote to memory of 612 1696 taskeng.exe Subfile.exe PID 1696 wrote to memory of 612 1696 taskeng.exe Subfile.exe PID 1696 wrote to memory of 612 1696 taskeng.exe Subfile.exe PID 684 wrote to memory of 112 684 Google Chrome.exe netsh.exe PID 684 wrote to memory of 112 684 Google Chrome.exe netsh.exe PID 684 wrote to memory of 112 684 Google Chrome.exe netsh.exe PID 684 wrote to memory of 112 684 Google Chrome.exe netsh.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"C:\Users\Admin\AppData\Local\Temp/Heart-Sender-V1.2 Cracked by JC0der-FireEye.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exe"C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\7BF3.tmp\7BF4.tmp\7BF5.vbs //Nologo3⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe"C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Heart\Load.exe"4⤵
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Config.bat" "4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users"5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath "C:\Users" -force5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Microsoft\SubDir\Subfile0" /tr "C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe" /RL HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Microsoft\SubDir\Subfile1" /tr "C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe" /RL HIGHEST /f5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\SubDirr5⤵
- Views/modifies file attributes
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Loader.exeloader.exe -pP@$$W@RD@@5⤵
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2_Cracked_by_JC0der-FireEye\Config\Loader1.exeloader1.exe -pP@$$W@RD@@5⤵
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\test404.exeC:\Users\Admin\AppData\Local\Temp/test404.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Google Chrome.exe" "Google Chrome.exe" ENABLE4⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {5C1F9CA3-44FC-41CE-A654-1A0F0BFBFA03} S-1-5-21-293278959-2699126792-324916226-1000:TUICJFPF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exeC:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exeC:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_09723407-f47a-4157-bb6c-bb0d7f759f67MD5
a70ee38af4bb2b5ed3eeb7cbd1a12fa3
SHA181dbaeae4b0f9e1adc0a1e3d6d76a12396498ba9
SHA256dd2f41f92f19c3fe031bdf5da68ab06768e26762d0077b290cd0094df1d5d58d
SHA5128c69a5300c7545c5c4b25a0594e6813b6b7a85b5f3ae7fc5464b4074fe6f50b2f49d31cacf19bc20a02bb8e237656f1b9b2a3f6a3953e3a8478ca2adc154e0e3
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_159e4ecb-d8d2-4a4d-9541-c0c7893f6225MD5
e5b3ba61c3cf07deda462c9b27eb4166
SHA1b324dad73048be6e27467315f82b7a5c1438a1f9
SHA256b84fae85b6203a0c8c9db3ba3c050c97d6700e5c9ae27dd31c103ec1bbb02925
SHA512a5936a098db2e8c0d0231fd97d73cc996ad99897fd64f0e5c6761c44b8eb2db2bff477843d326503e6027c1113da0e8e35f4227195a3cf505c5a374ebe0f67fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_22eaf65e-38a5-4334-9520-765225d73f93MD5
d89968acfbd0cd60b51df04860d99896
SHA1b3c29916ccb81ce98f95bbf3aa8a73de16298b29
SHA2561020cc7c929cd5a4e68ccb40353ca76f427df363f0d95e456eb79db039bdb2b9
SHA512b0e886cce598371b59131fed1535e220c798691bad93ef9474ba440066f5a6bd77a60966604b7a5ff6298b2e200c9dd0c8f9f04aff208b2af423480ead4e8842
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_2416a213-342c-4087-a62b-b80495159a08MD5
2d5cd190b5db0620cd62e3cd6ba1dcd3
SHA1ff4f229f4fbacccdf11d98c04ba756bda80aac7a
SHA256ab9aee31b3411bcc5a5fb51e9375777cca79cfb3a532d93ddd98a5673c60571d
SHA512edb2a46f3ee33b48f8fe0b548c1e7940978d0e4ac90d5090807d8b5c8b1320217e5d66990b1d0a85546acbbaf9b601590d35de87de234da8eafd60d12fdce610
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_4185f149-dc82-47a5-8ac3-a6d94c7c7f35MD5
7f79b990cb5ed648f9e583fe35527aa7
SHA171b177b48c8bd745ef02c2affad79ca222da7c33
SHA256080ec69d3f2abac629a0bdc314f150ad42a9a1b0a031b1d5c7b5b80051c48683
SHA51220926edf7f0b990da4bd8d7ba91bd8bf7b952b75080f687afa7197a91777604688303d38b4a0a7240b558c23f2e0cd927d3590765109f8be0551f5eb050eafda
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_6dac46c9-6e00-425e-aeb9-ab5981105f50MD5
6f0d509e28be1af95ba237d4f43adab4
SHA1c665febe79e435843553bee86a6cea731ce6c5e4
SHA256f545be30e70cd6e1b70e98239219735f6b61c25712720bb1e1738f02be900e7e
SHA5128dbadc140fd18eb16e2a282e3a0a895299b124850e7b9454a3f24e1cc1c090c5bebfbff5062e8807369e84ed7359e0854722cfd45b9a63681f9fea8c97fab797
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheEntry_83a3b091-194f-40b1-b4d9-cd8cead2368aMD5
faa37917b36371249ac9fcf93317bf97
SHA1a0f0d84d58ee518d33a69f5f1c343aa921c8ffd4
SHA256b92f1a891dbe4152a1f834774cc83378d8b4cffb7e344a813219d74ec4084132
SHA512614d3692e5be7554a72a38af408458254af271eaf6855f322ae07aaa647b1478c7ad13027285c8d9999db3739d65ac85ecfdf3e56acca8484083aa0e31de2198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\CommandAnalysis\PowerShell_AnalysisCacheIndexMD5
9b763985e491367eea762f44291142d4
SHA1fc3f36e4e8656178c7684ff9ddf17fea8b0b22ef
SHA2562f9fe7f50faec10df204e681b4b9e1a818c613886473931b4a8ae680982f3bd3
SHA51220ffd00ded3c0c84dced191f571b6ddd22dd8f851788986f5cf95f64979f3eccf32db40c3b866b23f57f5f8a10a20a31b1cac76e975015bfcb2cc03a0a579c23
-
C:\Users\Admin\AppData\Local\Temp\7BF3.tmp\7BF4.tmp\7BF5.vbsMD5
eb6e66649458ab67cd6b1c1119d27cc3
SHA18099e76b7c4c5d593889d3d4bcf709e926d3eaab
SHA25626dfa79be36cbdfcc3850d17dc704c16ef2772a4b561e13f349307571230f0e0
SHA512daacbcd01d8d5555dda47ed08b042b29e203ee7ca6a29252a27bb14f6f742db2c1c58d5b83ce36d8c1fb40fae22ef14c0777cbc1ae0f9d28e8d2bb28c7933c08
-
C:\Users\Admin\AppData\Local\Temp\A1D26E2\7A5E44C63C.tmpMD5
cb0de434b038de61b61d60e2d284c2c5
SHA1f4197c2ccaf7c42679c15208945e3536d27eda97
SHA256b5050491771ba6bc4305574127ef774caca08280f64f0cea0a44dd8cfb0ecae3
SHA5122984641dcfa04dedcd4a5c6bfd181da3c6352a9405043f9d6a73b0d84be84d5b61f619f209c7a89dcd7cb7631edbf4a40c5fbd6de006e97e15ea00bfd7e09324
-
C:\Users\Admin\AppData\Local\Temp\A1D26E2\BC4D3D0778.tmpMD5
a0f5d9448eed029fef6d9944df015832
SHA1560dc39fbdccf26465005baf60648d3e0e41b32a
SHA25602d46c7d93d8be4e82fd29d9452203f86d75476dbfcc952efa63360a260fb242
SHA512c41251267d6c42aa916df9e15304e839b0cb9087c834c9aa2a3b912b91c67ba1804e0a1854c64b14654d9ead03e1ed0e4a4ca3a4fd87616f7ad47c8edcec12d7
-
C:\Users\Admin\AppData\Local\Temp\A1D26E2\BF2A52468C.tmpMD5
cb12a9883105636361815cc05ae84a9b
SHA1e200f1b9553254dac2771c11e9c7eaf39095803c
SHA256fb6f81aaf1dbe4cf4a182b2f049504c2b137cf714eacddf8debc7087d52414e7
SHA51236dd29e931d771802e4f39ece4cb3ab6bff777457304d3242b88189ebd8a2650a68dba2b100309f6a5962af2d92416f91f0ad0e323e98d7276b2ecec0c657fec
-
C:\Users\Admin\AppData\Local\Temp\Google Chrome.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
C:\Users\Admin\AppData\Local\Temp\Google Chrome.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
C:\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exeMD5
2460a0af6c336e546ecb8d3a3bb6fab7
SHA1de23c0a0c8d5b42eb804a557073e7c9cd1fe8558
SHA2564ef7de2f82d7e76e2b408418c26e86680be7ca75f0406aa9e9f052a9e833ee7f
SHA512b75eef7ec0de1ba74ce7ff378f3307741bb3b7b52d092180947753e620c30edae928f68978ddc2dc23c6ae8e8f884cd64a69a875b23de47ebadfd09483170966
-
C:\Users\Admin\AppData\Local\Temp\test404.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
C:\Users\Admin\AppData\Local\Temp\test404.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msMD5
dfdabab5e7961a5edaa0998a3d737ebf
SHA1ec0bd9d6c41a98b8d9f6f7bdd39df6333370874d
SHA2566c7220e6082f20887f6042fbcdef308ff4baf464a3861f305d020bb19c67e2b9
SHA51251793bfcfbefa912fe055113ce45a8fc5cfa24ef2ba537bbcc09e6a99ca3f8a1d859dada71a93e9129013641fced09ef82c00b3a3ca7f7883efa49871b586fb1
-
C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exeMD5
3e5da207d7655d267515b8fd7fe35b8a
SHA185a81b28b919d283c7ae1df1a6c8c45dc0ff756a
SHA256db4b1a7399ad2e1fc3d8e64cb9e870a4b7f36ef629614517942a4b7318c29f42
SHA512f097cfdaa714fe1dfcb360467010597015ba1ff4ca686d340d1775bdeadbe02d4d9ec064d78e20add0c29bd4f06f8ef9ee572f2374031a6313af2f7602c0530d
-
C:\Users\Admin\AppData\Roaming\SubDirr\Subfile.exeMD5
3e5da207d7655d267515b8fd7fe35b8a
SHA185a81b28b919d283c7ae1df1a6c8c45dc0ff756a
SHA256db4b1a7399ad2e1fc3d8e64cb9e870a4b7f36ef629614517942a4b7318c29f42
SHA512f097cfdaa714fe1dfcb360467010597015ba1ff4ca686d340d1775bdeadbe02d4d9ec064d78e20add0c29bd4f06f8ef9ee572f2374031a6313af2f7602c0530d
-
C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exeMD5
4fb7326fe1263d2f0626ee186195b891
SHA1f2ceda16fe3ba9e90e2b17f77879278923fb3fe9
SHA256d4641707fb9daa4f2e4e30f869a968f022f98c1067a9d8a9bd21ab22e56f82f4
SHA512f4191396b94e1517af938a9ca6068686956e99b2bde98ed6dccc14c05ecf016c11a75010c5e911a52524886e9404cb001d68832230b15d455fab514ddd9fce7a
-
C:\Users\Admin\AppData\Roaming\SubDirr\Sys32.exeMD5
4fb7326fe1263d2f0626ee186195b891
SHA1f2ceda16fe3ba9e90e2b17f77879278923fb3fe9
SHA256d4641707fb9daa4f2e4e30f869a968f022f98c1067a9d8a9bd21ab22e56f82f4
SHA512f4191396b94e1517af938a9ca6068686956e99b2bde98ed6dccc14c05ecf016c11a75010c5e911a52524886e9404cb001d68832230b15d455fab514ddd9fce7a
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Program Files\Common Files\System\symsrv.dllMD5
7574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
\Users\Admin\AppData\Local\Temp\Google Chrome.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
\Users\Admin\AppData\Local\Temp\Heart-Sender-V1.2 Cracked by JC0der-FireEye.exeMD5
2460a0af6c336e546ecb8d3a3bb6fab7
SHA1de23c0a0c8d5b42eb804a557073e7c9cd1fe8558
SHA2564ef7de2f82d7e76e2b408418c26e86680be7ca75f0406aa9e9f052a9e833ee7f
SHA512b75eef7ec0de1ba74ce7ff378f3307741bb3b7b52d092180947753e620c30edae928f68978ddc2dc23c6ae8e8f884cd64a69a875b23de47ebadfd09483170966
-
\Users\Admin\AppData\Local\Temp\test404.exeMD5
943df0dd122ec18e4a64231c3d8cb3f9
SHA15abb3181f354cd5d48726fad840518926f8ff0d7
SHA25648945de236ef7a39cf323719c174300653f9c6d35329512c0b2a29cc3ec9ea91
SHA5121bcc301995f984593f9874ef59f79e00ff91031f3bbb1205ff661576365299ae930e9f83356f6a49ab00cfc233f614302266c6707bba7bf86b5d505f96d71009
-
memory/112-191-0x0000000000000000-mapping.dmp
-
memory/364-153-0x0000000000000000-mapping.dmp
-
memory/612-196-0x00000000753C6000-0x00000000753C7000-memory.dmpFilesize
4KB
-
memory/612-181-0x0000000000000000-mapping.dmp
-
memory/612-190-0x0000000004DD0000-0x0000000004DD1000-memory.dmpFilesize
4KB
-
memory/612-188-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/612-185-0x0000000073FC0000-0x00000000746AE000-memory.dmpFilesize
6.9MB
-
memory/612-195-0x00000000753C6000-0x00000000753C7000-memory.dmpFilesize
4KB
-
memory/684-171-0x0000000000CC0000-0x0000000000CC1000-memory.dmpFilesize
4KB
-
memory/684-165-0x0000000000000000-mapping.dmp
-
memory/684-176-0x0000000002CA5000-0x0000000002CB6000-memory.dmpFilesize
68KB
-
memory/684-169-0x0000000073FC0000-0x00000000746AE000-memory.dmpFilesize
6.9MB
-
memory/684-175-0x0000000002CA0000-0x0000000002CA1000-memory.dmpFilesize
4KB
-
memory/824-87-0x0000000073FC0000-0x00000000746AE000-memory.dmpFilesize
6.9MB
-
memory/824-113-0x0000000004670000-0x0000000004676000-memory.dmpFilesize
24KB
-
memory/824-111-0x00000000046D0000-0x00000000046D1000-memory.dmpFilesize
4KB
-
memory/824-108-0x00000000003B0000-0x00000000003C0000-memory.dmpFilesize
64KB
-
memory/824-99-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/824-127-0x00000000046D5000-0x00000000046E6000-memory.dmpFilesize
68KB
-
memory/824-83-0x0000000000000000-mapping.dmp
-
memory/1056-186-0x00000000010C0000-0x00000000010C1000-memory.dmpFilesize
4KB
-
memory/1056-182-0x000007FEF5650000-0x000007FEF603C000-memory.dmpFilesize
9.9MB
-
memory/1056-177-0x0000000000000000-mapping.dmp
-
memory/1080-89-0x0000000000000000-mapping.dmp
-
memory/1144-154-0x0000000000000000-mapping.dmp
-
memory/1192-5-0x0000000000000000-mapping.dmp
-
memory/1244-194-0x000007FEF6100000-0x000007FEF637A000-memory.dmpFilesize
2.5MB
-
memory/1300-152-0x0000000000000000-mapping.dmp
-
memory/1596-34-0x00000000008AA000-0x00000000008AB000-memory.dmpFilesize
4KB
-
memory/1596-37-0x00000000008B5000-0x00000000008B6000-memory.dmpFilesize
4KB
-
memory/1596-65-0x00000000008AE000-0x00000000008AF000-memory.dmpFilesize
4KB
-
memory/1596-67-0x00000000008B0000-0x00000000008B1000-memory.dmpFilesize
4KB
-
memory/1596-66-0x00000000008AF000-0x00000000008B0000-memory.dmpFilesize
4KB
-
memory/1596-60-0x00000000008E3000-0x00000000008E4000-memory.dmpFilesize
4KB
-
memory/1596-68-0x00000000008F7000-0x00000000008F8000-memory.dmpFilesize
4KB
-
memory/1596-70-0x000000000091C000-0x000000000091D000-memory.dmpFilesize
4KB
-
memory/1596-71-0x000000000091B000-0x000000000091C000-memory.dmpFilesize
4KB
-
memory/1596-72-0x00000000008F0000-0x00000000008F1000-memory.dmpFilesize
4KB
-
memory/1596-73-0x00000000008E7000-0x00000000008E8000-memory.dmpFilesize
4KB
-
memory/1596-74-0x0000000000914000-0x0000000000915000-memory.dmpFilesize
4KB
-
memory/1596-75-0x00000000008CC000-0x00000000008CD000-memory.dmpFilesize
4KB
-
memory/1596-77-0x0000000000902000-0x0000000000903000-memory.dmpFilesize
4KB
-
memory/1596-76-0x0000000000901000-0x0000000000902000-memory.dmpFilesize
4KB
-
memory/1596-78-0x00000000008E9000-0x00000000008EA000-memory.dmpFilesize
4KB
-
memory/1596-58-0x00000000008BD000-0x00000000008BE000-memory.dmpFilesize
4KB
-
memory/1596-80-0x00000000046C0000-0x00000000046D1000-memory.dmpFilesize
68KB
-
memory/1596-56-0x00000000008EC000-0x00000000008ED000-memory.dmpFilesize
4KB
-
memory/1596-82-0x00000000046C0000-0x00000000046D1000-memory.dmpFilesize
68KB
-
memory/1596-57-0x0000000000913000-0x0000000000914000-memory.dmpFilesize
4KB
-
memory/1596-55-0x0000000000915000-0x0000000000916000-memory.dmpFilesize
4KB
-
memory/1596-9-0x00000000008D3000-0x00000000008D4000-memory.dmpFilesize
4KB
-
memory/1596-54-0x00000000008C3000-0x00000000008C4000-memory.dmpFilesize
4KB
-
memory/1596-61-0x00000000008EA000-0x00000000008EB000-memory.dmpFilesize
4KB
-
memory/1596-2-0x0000000075781000-0x0000000075783000-memory.dmpFilesize
8KB
-
memory/1596-8-0x00000000008C6000-0x00000000008C7000-memory.dmpFilesize
4KB
-
memory/1596-11-0x00000000008C8000-0x00000000008C9000-memory.dmpFilesize
4KB
-
memory/1596-93-0x00000000008EE000-0x00000000008EF000-memory.dmpFilesize
4KB
-
memory/1596-94-0x00000000008E6000-0x00000000008E7000-memory.dmpFilesize
4KB
-
memory/1596-95-0x00000000008E0000-0x00000000008E1000-memory.dmpFilesize
4KB
-
memory/1596-96-0x00000000008DE000-0x00000000008DF000-memory.dmpFilesize
4KB
-
memory/1596-12-0x00000000008CA000-0x00000000008CB000-memory.dmpFilesize
4KB
-
memory/1596-52-0x00000000008AB000-0x00000000008AC000-memory.dmpFilesize
4KB
-
memory/1596-14-0x00000000008BF000-0x00000000008C0000-memory.dmpFilesize
4KB
-
memory/1596-53-0x00000000008CF000-0x00000000008D0000-memory.dmpFilesize
4KB
-
memory/1596-13-0x00000000008C1000-0x00000000008C2000-memory.dmpFilesize
4KB
-
memory/1596-15-0x00000000008C2000-0x00000000008C3000-memory.dmpFilesize
4KB
-
memory/1596-16-0x00000000008C9000-0x00000000008CA000-memory.dmpFilesize
4KB
-
memory/1596-27-0x00000000008BE000-0x00000000008BF000-memory.dmpFilesize
4KB
-
memory/1596-26-0x0000000000911000-0x0000000000912000-memory.dmpFilesize
4KB
-
memory/1596-25-0x00000000008CD000-0x00000000008CE000-memory.dmpFilesize
4KB
-
memory/1596-50-0x00000000008A3000-0x00000000008A4000-memory.dmpFilesize
4KB
-
memory/1596-24-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1596-23-0x00000000008D4000-0x00000000008D5000-memory.dmpFilesize
4KB
-
memory/1596-51-0x00000000008A4000-0x00000000008A5000-memory.dmpFilesize
4KB
-
memory/1596-28-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/1596-48-0x00000000008BC000-0x00000000008BD000-memory.dmpFilesize
4KB
-
memory/1596-22-0x00000000008C5000-0x00000000008C6000-memory.dmpFilesize
4KB
-
memory/1596-21-0x00000000008D9000-0x00000000008DA000-memory.dmpFilesize
4KB
-
memory/1596-20-0x00000000008D7000-0x00000000008D8000-memory.dmpFilesize
4KB
-
memory/1596-19-0x00000000008D6000-0x00000000008D7000-memory.dmpFilesize
4KB
-
memory/1596-49-0x00000000008A5000-0x00000000008A6000-memory.dmpFilesize
4KB
-
memory/1596-18-0x00000000008C4000-0x00000000008C5000-memory.dmpFilesize
4KB
-
memory/1596-17-0x00000000008CB000-0x00000000008CC000-memory.dmpFilesize
4KB
-
memory/1596-10-0x00000000008C7000-0x00000000008C8000-memory.dmpFilesize
4KB
-
memory/1596-64-0x00000000008DB000-0x00000000008DC000-memory.dmpFilesize
4KB
-
memory/1596-30-0x00000000008A7000-0x00000000008A8000-memory.dmpFilesize
4KB
-
memory/1596-29-0x00000000008AD000-0x00000000008AE000-memory.dmpFilesize
4KB
-
memory/1596-31-0x00000000008A8000-0x00000000008A9000-memory.dmpFilesize
4KB
-
memory/1596-32-0x00000000008AC000-0x00000000008AD000-memory.dmpFilesize
4KB
-
memory/1596-59-0x00000000008A2000-0x00000000008A3000-memory.dmpFilesize
4KB
-
memory/1596-33-0x0000000000912000-0x0000000000913000-memory.dmpFilesize
4KB
-
memory/1596-35-0x00000000008A1000-0x00000000008A2000-memory.dmpFilesize
4KB
-
memory/1596-45-0x00000000008B1000-0x00000000008B2000-memory.dmpFilesize
4KB
-
memory/1596-46-0x00000000008B2000-0x00000000008B3000-memory.dmpFilesize
4KB
-
memory/1596-44-0x00000000008B9000-0x00000000008BB000-memory.dmpFilesize
8KB
-
memory/1596-43-0x00000000008B9000-0x00000000008BA000-memory.dmpFilesize
4KB
-
memory/1596-42-0x00000000008B8000-0x00000000008BA000-memory.dmpFilesize
8KB
-
memory/1596-40-0x00000000008B7000-0x00000000008B8000-memory.dmpFilesize
4KB
-
memory/1596-41-0x00000000008B8000-0x00000000008B9000-memory.dmpFilesize
4KB
-
memory/1596-39-0x00000000008B6000-0x00000000008B7000-memory.dmpFilesize
4KB
-
memory/1596-62-0x00000000008E2000-0x00000000008E3000-memory.dmpFilesize
4KB
-
memory/1596-47-0x00000000008BB000-0x00000000008BC000-memory.dmpFilesize
4KB
-
memory/1596-63-0x00000000008ED000-0x00000000008EE000-memory.dmpFilesize
4KB
-
memory/1596-38-0x00000000008B5000-0x00000000008B7000-memory.dmpFilesize
8KB
-
memory/1596-36-0x00000000008B4000-0x00000000008B5000-memory.dmpFilesize
4KB
-
memory/1676-160-0x0000000000000000-mapping.dmp
-
memory/1732-124-0x0000000004A66000-0x0000000004A67000-memory.dmpFilesize
4KB
-
memory/1732-88-0x0000000000000000-mapping.dmp
-
memory/1732-90-0x0000000073FC0000-0x00000000746AE000-memory.dmpFilesize
6.9MB
-
memory/1732-100-0x0000000001170000-0x0000000001171000-memory.dmpFilesize
4KB
-
memory/1732-103-0x0000000000CC0000-0x0000000000D74000-memory.dmpFilesize
720KB
-
memory/1732-104-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/1732-123-0x0000000004A55000-0x0000000004A66000-memory.dmpFilesize
68KB
-
memory/1768-137-0x000007FEF4C60000-0x000007FEF564C000-memory.dmpFilesize
9.9MB
-
memory/1768-140-0x0000000002340000-0x0000000002341000-memory.dmpFilesize
4KB
-
memory/1768-143-0x0000000001D40000-0x0000000001D41000-memory.dmpFilesize
4KB
-
memory/1768-134-0x0000000000000000-mapping.dmp
-
memory/1768-142-0x000000001AD44000-0x000000001AD46000-memory.dmpFilesize
8KB
-
memory/1768-141-0x000000001AD40000-0x000000001AD42000-memory.dmpFilesize
8KB
-
memory/1768-138-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/1768-139-0x000000001ADC0000-0x000000001ADC1000-memory.dmpFilesize
4KB
-
memory/1912-155-0x0000000000000000-mapping.dmp
-
memory/1964-114-0x0000000002740000-0x0000000002741000-memory.dmpFilesize
4KB
-
memory/1964-117-0x0000000002770000-0x0000000002771000-memory.dmpFilesize
4KB
-
memory/1964-106-0x000000001AE90000-0x000000001AE91000-memory.dmpFilesize
4KB
-
memory/1964-105-0x00000000023A0000-0x00000000023A1000-memory.dmpFilesize
4KB
-
memory/1964-98-0x000007FEF5650000-0x000007FEF603C000-memory.dmpFilesize
9.9MB
-
memory/1964-110-0x000000001AE14000-0x000000001AE16000-memory.dmpFilesize
8KB
-
memory/1964-109-0x000000001AE10000-0x000000001AE12000-memory.dmpFilesize
8KB
-
memory/1964-107-0x0000000002020000-0x0000000002021000-memory.dmpFilesize
4KB
-
memory/1964-112-0x00000000023E0000-0x00000000023E1000-memory.dmpFilesize
4KB
-
memory/1964-133-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/1964-92-0x0000000000000000-mapping.dmp
-
memory/1964-132-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/2008-91-0x00000000026C0000-0x00000000026C4000-memory.dmpFilesize
16KB
-
memory/2008-85-0x000007FEFBA81000-0x000007FEFBA83000-memory.dmpFilesize
8KB
-
memory/2008-69-0x0000000000000000-mapping.dmp