Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
14-04-2021 08:33
Behavioral task
behavioral1
Sample
2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe
Resource
win10v20210408
General
-
Target
2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe
-
Size
2.9MB
-
MD5
21948d42c2c1e49cadea88e80dfe6880
-
SHA1
d7f6837f76f3785eef87048c4a28c4b664f99dbd
-
SHA256
2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7
-
SHA512
14054453d259e53d88881a6b50061960befc06309fc14d1f557d5cb3cbc2ac7e855a805cc483915e8b5ce737c328dd03a8cfbc9a68a670e0238896009befa863
Malware Config
Extracted
remcos
daya4659.ddns.net:8282
Signatures
-
RevcodeRat, WebMonitorRat
WebMonitor is a remote access tool that you can use from any browser access to control, and monitor your phones, or PCs.
-
Executes dropped EXE 10 IoCs
Processes:
remcos_agent_Protected.exeremcos_agent_Protected.exeremcos.exeremcos.exedriverquery.exesfc.exedriverquery.exesfc.exesfc.exesfc.exepid process 3300 remcos_agent_Protected.exe 1360 remcos_agent_Protected.exe 2820 remcos.exe 2376 remcos.exe 4132 driverquery.exe 4156 sfc.exe 4188 driverquery.exe 4312 sfc.exe 4496 sfc.exe 4520 sfc.exe -
Processes:
resource yara_rule behavioral2/memory/4188-183-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/4188-187-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
remcos.exedriverquery.exeremcos_agent_Protected.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WebMonitor-9923 = "C:\\Users\\Admin\\AppData\\Roaming\\WebMonitor-9923.exe관" driverquery.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\remcos = "\"C:\\Users\\Admin\\AppData\\Roaming\\remcos\\remcos.exe\"" remcos_agent_Protected.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos_agent_Protected.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ remcos.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ remcos.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
remcos_agent_Protected.exeremcos.exedriverquery.exesfc.exesfc.exedescription pid process target process PID 3300 set thread context of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 2820 set thread context of 2376 2820 remcos.exe remcos.exe PID 4132 set thread context of 4188 4132 driverquery.exe driverquery.exe PID 4156 set thread context of 4312 4156 sfc.exe sfc.exe PID 4496 set thread context of 4520 4496 sfc.exe sfc.exe -
HTTP links in PDF interactive object 4 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdf pdf_with_link_action C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe pdf_with_link_action C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe pdf_with_link_action C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe pdf_with_link_action -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Creates scheduled task(s) 1 TTPs 6 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1828 schtasks.exe 4248 schtasks.exe 4384 schtasks.exe 4596 schtasks.exe 2936 schtasks.exe 1492 schtasks.exe -
Processes:
AcroRd32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
Processes:
remcos_agent_Protected.exe2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings remcos_agent_Protected.exe Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
remcos.exepid process 2376 remcos.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
AcroRd32.exepid process 2588 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
Processes:
AcroRd32.exeremcos.exepid process 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2588 AcroRd32.exe 2376 remcos.exe 2588 AcroRd32.exe 2588 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exeremcos_agent_Protected.exeremcos_agent_Protected.exeWScript.execmd.exeremcos.exeremcos.exeAcroRd32.exeRdrCEF.exedescription pid process target process PID 848 wrote to memory of 3300 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe remcos_agent_Protected.exe PID 848 wrote to memory of 3300 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe remcos_agent_Protected.exe PID 848 wrote to memory of 3300 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe remcos_agent_Protected.exe PID 848 wrote to memory of 2588 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe AcroRd32.exe PID 848 wrote to memory of 2588 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe AcroRd32.exe PID 848 wrote to memory of 2588 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe AcroRd32.exe PID 848 wrote to memory of 204 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 204 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 204 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 192 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 192 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 192 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 3048 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 3048 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 3048 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 1928 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 1928 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 1928 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2312 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2312 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2312 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2176 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2176 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2176 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe PID 848 wrote to memory of 2936 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe schtasks.exe PID 848 wrote to memory of 2936 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe schtasks.exe PID 848 wrote to memory of 2936 848 2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe schtasks.exe PID 3300 wrote to memory of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 3300 wrote to memory of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 3300 wrote to memory of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 3300 wrote to memory of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 3300 wrote to memory of 1360 3300 remcos_agent_Protected.exe remcos_agent_Protected.exe PID 1360 wrote to memory of 2252 1360 remcos_agent_Protected.exe WScript.exe PID 1360 wrote to memory of 2252 1360 remcos_agent_Protected.exe WScript.exe PID 1360 wrote to memory of 2252 1360 remcos_agent_Protected.exe WScript.exe PID 3300 wrote to memory of 1492 3300 remcos_agent_Protected.exe schtasks.exe PID 3300 wrote to memory of 1492 3300 remcos_agent_Protected.exe schtasks.exe PID 3300 wrote to memory of 1492 3300 remcos_agent_Protected.exe schtasks.exe PID 2252 wrote to memory of 3920 2252 WScript.exe cmd.exe PID 2252 wrote to memory of 3920 2252 WScript.exe cmd.exe PID 2252 wrote to memory of 3920 2252 WScript.exe cmd.exe PID 3920 wrote to memory of 2820 3920 cmd.exe remcos.exe PID 3920 wrote to memory of 2820 3920 cmd.exe remcos.exe PID 3920 wrote to memory of 2820 3920 cmd.exe remcos.exe PID 2820 wrote to memory of 2376 2820 remcos.exe remcos.exe PID 2820 wrote to memory of 2376 2820 remcos.exe remcos.exe PID 2820 wrote to memory of 2376 2820 remcos.exe remcos.exe PID 2820 wrote to memory of 2376 2820 remcos.exe remcos.exe PID 2820 wrote to memory of 2376 2820 remcos.exe remcos.exe PID 2376 wrote to memory of 772 2376 remcos.exe svchost.exe PID 2376 wrote to memory of 772 2376 remcos.exe svchost.exe PID 2376 wrote to memory of 772 2376 remcos.exe svchost.exe PID 2820 wrote to memory of 1828 2820 remcos.exe schtasks.exe PID 2820 wrote to memory of 1828 2820 remcos.exe schtasks.exe PID 2820 wrote to memory of 1828 2820 remcos.exe schtasks.exe PID 2588 wrote to memory of 1492 2588 AcroRd32.exe RdrCEF.exe PID 2588 wrote to memory of 1492 2588 AcroRd32.exe RdrCEF.exe PID 2588 wrote to memory of 1492 2588 AcroRd32.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe PID 1492 wrote to memory of 1012 1492 RdrCEF.exe RdrCEF.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\install.vbs"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeC:\Users\Admin\AppData\Roaming\remcos\remcos.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"C:\Users\Admin\AppData\Roaming\remcos\remcos.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe8⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F3⤵
- Creates scheduled task(s)
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=13B573C94CF666E732A57874DDF3C230 --mojo-platform-channel-handle=1624 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CD1AA85F87190D47A4902E3FC5EC8544 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CD1AA85F87190D47A4902E3FC5EC8544 --renderer-client-id=2 --mojo-platform-channel-handle=1652 --allow-no-sandbox-job /prefetch:14⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=56457EC840C7E8394BF2CFEFE111D98E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=56457EC840C7E8394BF2CFEFE111D98E --renderer-client-id=4 --mojo-platform-channel-handle=2072 --allow-no-sandbox-job /prefetch:14⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7CBB0771DA1A70D4A0C84C2A461511AD --mojo-platform-channel-handle=1656 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=32C774F9A67013012F7EC6609A2483E8 --mojo-platform-channel-handle=2480 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4990A6FDDC14A28D503C3C375A308C52 --mojo-platform-channel-handle=2516 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"C:\Users\Admin\AppData\Local\Temp\2ef1aedbfa1d92513e8a45015b59cdd649eb7aac25e420b18c5d564c30066ea7.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeC:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn WWAHost /tr "C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeC:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\SysWOW64\schtasks.exe" /create /tn setx /tr "C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exe" /sc minute /mo 1 /F2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\install.vbsMD5
ff449f6f7bc5e2d800eb30e2d2c56611
SHA193419ea805b9ce35a766e5c56db50d54c2d3f94b
SHA256655787cf79040ee701963986320556a834d6345e850e03653e4852d94eb09416
SHA51202a17064c837d36ba241fb8edf9266e33479a10eb8652b974158a3227878a801da29db1108413bb2c298a105b3c19bd20c3a3100f19444189f434706825766a6
-
C:\Users\Admin\AppData\Local\Temp\medical-application-form.pdfMD5
bb0aa1bade4df17033a05d8d682b44d2
SHA1bec4b0a8a7413d158cf6705a3c888bdf36a4371b
SHA25696d6c8c54390b476e8f8f42b99b52efb19eca152bf046c254992bc2f2faba764
SHA5126bfe1b289f9c84d4db5a564ed129f7920775946981d5da5cb7753d63a141d84486ba9e958044e8162fba2eba875e56c358f92091b760e07b8cbe459e4202e4d9
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d55aa75917c1e90dfd355442e9c36be0
SHA1285ef46646bc5093d4e582611572f38ef9ec9c80
SHA2566fcac1f0f026879c69b9b6b27a8ddb9c10ce724b28fab9b354e2d3bdb826338b
SHA51234a1b891202f8c5cdabb80a56d783a340b591e3a0115a62b72bec01f3dc666467ac9ec97bcb48341f36d878342b162fde0e5ef85a316d8ad136dda84d93960ef
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d55aa75917c1e90dfd355442e9c36be0
SHA1285ef46646bc5093d4e582611572f38ef9ec9c80
SHA2566fcac1f0f026879c69b9b6b27a8ddb9c10ce724b28fab9b354e2d3bdb826338b
SHA51234a1b891202f8c5cdabb80a56d783a340b591e3a0115a62b72bec01f3dc666467ac9ec97bcb48341f36d878342b162fde0e5ef85a316d8ad136dda84d93960ef
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d55aa75917c1e90dfd355442e9c36be0
SHA1285ef46646bc5093d4e582611572f38ef9ec9c80
SHA2566fcac1f0f026879c69b9b6b27a8ddb9c10ce724b28fab9b354e2d3bdb826338b
SHA51234a1b891202f8c5cdabb80a56d783a340b591e3a0115a62b72bec01f3dc666467ac9ec97bcb48341f36d878342b162fde0e5ef85a316d8ad136dda84d93960ef
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d55aa75917c1e90dfd355442e9c36be0
SHA1285ef46646bc5093d4e582611572f38ef9ec9c80
SHA2566fcac1f0f026879c69b9b6b27a8ddb9c10ce724b28fab9b354e2d3bdb826338b
SHA51234a1b891202f8c5cdabb80a56d783a340b591e3a0115a62b72bec01f3dc666467ac9ec97bcb48341f36d878342b162fde0e5ef85a316d8ad136dda84d93960ef
-
C:\Users\Admin\AppData\Roaming\CapabilityAccessHandlers\sfc.exeMD5
d55aa75917c1e90dfd355442e9c36be0
SHA1285ef46646bc5093d4e582611572f38ef9ec9c80
SHA2566fcac1f0f026879c69b9b6b27a8ddb9c10ce724b28fab9b354e2d3bdb826338b
SHA51234a1b891202f8c5cdabb80a56d783a340b591e3a0115a62b72bec01f3dc666467ac9ec97bcb48341f36d878342b162fde0e5ef85a316d8ad136dda84d93960ef
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeMD5
b15fab3ebfd57ddf98a8019c4cc05024
SHA1a5061c06bfd3fd183427e4a49e92df00efcd9d2f
SHA256814f5fb3e32226971eddfcf2bc588073974ca27aa99624314ce3e376c58cfcaa
SHA512491688cc4788ec2f3c1d699754f3363289770c2ccb8886de7284c134bcef9872f9e3cb4d82a9e79eb1bf291a89c6c7aee763123ba3ed60b1b02171579a96743a
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeMD5
b15fab3ebfd57ddf98a8019c4cc05024
SHA1a5061c06bfd3fd183427e4a49e92df00efcd9d2f
SHA256814f5fb3e32226971eddfcf2bc588073974ca27aa99624314ce3e376c58cfcaa
SHA512491688cc4788ec2f3c1d699754f3363289770c2ccb8886de7284c134bcef9872f9e3cb4d82a9e79eb1bf291a89c6c7aee763123ba3ed60b1b02171579a96743a
-
C:\Users\Admin\AppData\Roaming\RtDCpl64\driverquery.exeMD5
b15fab3ebfd57ddf98a8019c4cc05024
SHA1a5061c06bfd3fd183427e4a49e92df00efcd9d2f
SHA256814f5fb3e32226971eddfcf2bc588073974ca27aa99624314ce3e376c58cfcaa
SHA512491688cc4788ec2f3c1d699754f3363289770c2ccb8886de7284c134bcef9872f9e3cb4d82a9e79eb1bf291a89c6c7aee763123ba3ed60b1b02171579a96743a
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
C:\Users\Admin\AppData\Roaming\remcos\remcos.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
C:\Users\Admin\AppData\Roaming\remcos_agent_Protected.exeMD5
d5581c9db64b399c7d0cdb3f7b78673b
SHA187396211e6468d73c97301fe0b673f64bcd6d17c
SHA2567210f2ca290296d1f6e61da4b3192ad19afd719d6cf77dbb2d6810734b349826
SHA5125a8034902bfd110826aebc8196469f0dea26d94fcb093406342657b9660f400cc495a6a7ce843d32a7541083cfbc3f0fbdf9aab1ad08294729307bffe7c512c6
-
memory/848-127-0x00000000036E0000-0x00000000036E1000-memory.dmpFilesize
4KB
-
memory/1012-153-0x0000000000000000-mapping.dmp
-
memory/1012-151-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/1360-129-0x0000000000140000-0x0000000000160000-memory.dmpFilesize
128KB
-
memory/1360-119-0x0000000000140000-0x0000000000160000-memory.dmpFilesize
128KB
-
memory/1360-125-0x0000000000153614-mapping.dmp
-
memory/1492-150-0x0000000000000000-mapping.dmp
-
memory/1492-131-0x0000000000000000-mapping.dmp
-
memory/1828-148-0x0000000000000000-mapping.dmp
-
memory/2252-130-0x0000000000000000-mapping.dmp
-
memory/2376-144-0x0000000000413614-mapping.dmp
-
memory/2376-146-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2376-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2584-169-0x0000000000000000-mapping.dmp
-
memory/2584-167-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/2588-117-0x0000000000000000-mapping.dmp
-
memory/2820-135-0x0000000000000000-mapping.dmp
-
memory/2936-118-0x0000000000000000-mapping.dmp
-
memory/3048-157-0x0000000000000000-mapping.dmp
-
memory/3048-155-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/3300-128-0x0000000000C80000-0x0000000000DCA000-memory.dmpFilesize
1.3MB
-
memory/3300-114-0x0000000000000000-mapping.dmp
-
memory/3396-161-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/3396-163-0x0000000000000000-mapping.dmp
-
memory/3920-177-0x0000000000000000-mapping.dmp
-
memory/3920-175-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/3920-134-0x0000000000000000-mapping.dmp
-
memory/3948-173-0x0000000000000000-mapping.dmp
-
memory/3948-171-0x0000000077722000-0x000000007772200C-memory.dmpFilesize
12B
-
memory/4188-191-0x0000000000401000-0x0000000000476000-memory.dmpFilesize
468KB
-
memory/4188-190-0x0000000000476000-0x00000000004BF000-memory.dmpFilesize
292KB
-
memory/4188-183-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/4188-187-0x0000000000400000-0x00000000004C0000-memory.dmpFilesize
768KB
-
memory/4188-185-0x00000000004BE2D0-mapping.dmp
-
memory/4248-188-0x0000000000000000-mapping.dmp
-
memory/4312-198-0x0000000000413614-mapping.dmp
-
memory/4384-201-0x0000000000000000-mapping.dmp
-
memory/4520-210-0x0000000000413614-mapping.dmp
-
memory/4596-213-0x0000000000000000-mapping.dmp