Analysis
-
max time kernel
109s -
max time network
105s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-07-2021 19:24
Static task
static1
Behavioral task
behavioral1
Sample
43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe
Resource
win7v20210408
General
-
Target
43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe
-
Size
6.4MB
-
MD5
f8955d98605d27a397492f0cedbb55f3
-
SHA1
058c7a9ace05fbd7d8105033c675bdfa90a9c379
-
SHA256
43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f
-
SHA512
5664b483d65aabad7b09547a90ed2de8758038d1e048e729e6025604bf795995e521aca4474a4a18d6d6c5d94a34e46f4f3bfc809c18f1ed747592f86b2149d3
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
Processes:
002.exeSetup.exesetup.exealiens.exejg2_2qua.exeE128AF959BD8F940.exeE128AF959BD8F940.exepid process 1992 002.exe 1036 Setup.exe 1916 setup.exe 1600 aliens.exe 1176 jg2_2qua.exe 944 E128AF959BD8F940.exe 896 E128AF959BD8F940.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\gdiview.msi office_xlm_macros -
Loads dropped DLL 21 IoCs
Processes:
43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exeSetup.exesetup.exealiens.exeMsiExec.exepid process 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 1036 Setup.exe 1036 Setup.exe 1036 Setup.exe 1036 Setup.exe 1916 setup.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 1600 aliens.exe 1600 aliens.exe 2032 MsiExec.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
aliens.exeE128AF959BD8F940.exeE128AF959BD8F940.exedescription ioc process File opened for modification \??\PhysicalDrive0 aliens.exe File opened for modification \??\PhysicalDrive0 E128AF959BD8F940.exe File opened for modification \??\PhysicalDrive0 E128AF959BD8F940.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
aliens.exepid process 1600 aliens.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
E128AF959BD8F940.exedescription pid process target process PID 944 set thread context of 1772 944 E128AF959BD8F940.exe firefox.exe PID 944 set thread context of 1296 944 E128AF959BD8F940.exe firefox.exe PID 944 set thread context of 1008 944 E128AF959BD8F940.exe firefox.exe -
Drops file in Program Files directory 4 IoCs
Processes:
setup.exedescription ioc process File opened for modification C:\Program Files (x86)\z2mk9vdia0gw\aliens.exe setup.exe File opened for modification C:\Program Files (x86)\z2mk9vdia0gw setup.exe File created C:\Program Files (x86)\z2mk9vdia0gw\__tmp_rar_sfx_access_check_259314861 setup.exe File created C:\Program Files (x86)\z2mk9vdia0gw\aliens.exe setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 344 taskkill.exe -
Processes:
aliens.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD aliens.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\6C0CE2DD0584C47CAC18839F14055F19FA270CDD\Blob = 0300000001000000140000006c0ce2dd0584c47cac18839f14055f19fa270cdd2000000001000000500500003082054c30820434a0030201020206016de34cff62300d06092a864886f70d01010b05003081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a301e170d3030303130313030303030305a170d3438313231353039313533375a3081aa313b303906035504030c32436861726c65732050726f78792043412028313920e58d81e69c8820323031392c204445534b544f502d424e41543131552931253023060355040b0c1c68747470733a2f2f636861726c657370726f78792e636f6d2f73736c3111300f060355040a0c08584b3732204c74643111300f06035504070c084175636b6c616e643111300f06035504080c084175636b6c616e64310b3009060355040613024e5a30820122300d06092a864886f70d01010105000382010f003082010a0282010100ae86c5043ed34d99f44fa3052ea34047a7fbbe33188b1dc2ca645ca3249e85e54b4921d4998fda6a22247c32d9087d742af3bf850803ae8c1e25faad53fb8fd823b7353d9a3ac992bf917f693826c790e53a540b120b6553508ec9585e467d310bd3ef9fb61731deb522eb78f43f824b34be36782db7a8cb162cd22247b14e4c5ae633ed66542354a59971bddc59160ecdc521b4477c93ca9e624e0af00298602300f5dc368819c3cb9f02604636888276b3a498570473b5328b0834f327c34285e333da9207e12f0edbb654c8cf11e3cc7cba17a52cd7cd42c10ae095a2e4eb9d3e3f361488243f0584af40e72d6e6e182149bfb8342384f60f12e14734258d0203010001a382017430820170300f0603551d130101ff040530030101ff3082012c06096086480186f842010d0482011d138201195468697320526f6f74206365727469666963617465207761732067656e65726174656420627920436861726c65732050726f787920666f722053534c2050726f7879696e672e20496620746869732063657274696669636174652069732070617274206f66206120636572746966696361746520636861696e2c2074686973206d65616e73207468617420796f752772652062726f7773696e67207468726f75676820436861726c65732050726f787920776974682053534c2050726f7879696e6720656e61626c656420666f72207468697320776562736974652e20506c656173652073656520687474703a2f2f636861726c657370726f78792e636f6d2f73736c20666f72206d6f726520696e666f726d6174696f6e2e300e0603551d0f0101ff040403020204301d0603551d0e04160414f8d0dc54367cf794020f8b92783a5d8a91251f9f300d06092a864886f70d01010b05000382010100662271eb9d5c744c88382de98ba37320e6312104d04273a92007a8670976d6530e6347d00bbded1319bb6754f36237596095922911e3661a70354f6ba0b797a76258be7adebb8c8dbeeed977760b80271d74b2444d92f6c1337a379b73545b251de5f8812b9625abbbfaedc15f8c6c374b9b26dd0fef035185f5899d8819e689dc6db5f0babbfd637c52b1bec80115b889faeed493d4112d744954ad3abe6607c41a4a2d657ba330ed131fa4e8c25bb28ee181dcef8da91c17bfd30a23c8eae81b152ed85ff938afc32b34ffdaffbdb72d9bb04067bfc87f579eba9637b165ea008ea7408bc8265f33c039bf60f506d245a6b53017afc8e161d70ed5b0d76576 aliens.exe -
Runs ping.exe 1 TTPs 3 IoCs
Processes:
PING.EXEPING.EXEPING.EXEpid process 1464 PING.EXE 1700 PING.EXE 1700 PING.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
E128AF959BD8F940.exepid process 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe 944 E128AF959BD8F940.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 1760 msiexec.exe Token: SeIncreaseQuotaPrivilege 1760 msiexec.exe Token: SeRestorePrivilege 920 msiexec.exe Token: SeTakeOwnershipPrivilege 920 msiexec.exe Token: SeSecurityPrivilege 920 msiexec.exe Token: SeCreateTokenPrivilege 1760 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1760 msiexec.exe Token: SeLockMemoryPrivilege 1760 msiexec.exe Token: SeIncreaseQuotaPrivilege 1760 msiexec.exe Token: SeMachineAccountPrivilege 1760 msiexec.exe Token: SeTcbPrivilege 1760 msiexec.exe Token: SeSecurityPrivilege 1760 msiexec.exe Token: SeTakeOwnershipPrivilege 1760 msiexec.exe Token: SeLoadDriverPrivilege 1760 msiexec.exe Token: SeSystemProfilePrivilege 1760 msiexec.exe Token: SeSystemtimePrivilege 1760 msiexec.exe Token: SeProfSingleProcessPrivilege 1760 msiexec.exe Token: SeIncBasePriorityPrivilege 1760 msiexec.exe Token: SeCreatePagefilePrivilege 1760 msiexec.exe Token: SeCreatePermanentPrivilege 1760 msiexec.exe Token: SeBackupPrivilege 1760 msiexec.exe Token: SeRestorePrivilege 1760 msiexec.exe Token: SeShutdownPrivilege 1760 msiexec.exe Token: SeDebugPrivilege 1760 msiexec.exe Token: SeAuditPrivilege 1760 msiexec.exe Token: SeSystemEnvironmentPrivilege 1760 msiexec.exe Token: SeChangeNotifyPrivilege 1760 msiexec.exe Token: SeRemoteShutdownPrivilege 1760 msiexec.exe Token: SeUndockPrivilege 1760 msiexec.exe Token: SeSyncAgentPrivilege 1760 msiexec.exe Token: SeEnableDelegationPrivilege 1760 msiexec.exe Token: SeManageVolumePrivilege 1760 msiexec.exe Token: SeImpersonatePrivilege 1760 msiexec.exe Token: SeCreateGlobalPrivilege 1760 msiexec.exe Token: SeCreateTokenPrivilege 1760 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 1760 msiexec.exe Token: SeLockMemoryPrivilege 1760 msiexec.exe Token: SeIncreaseQuotaPrivilege 1760 msiexec.exe Token: SeMachineAccountPrivilege 1760 msiexec.exe Token: SeTcbPrivilege 1760 msiexec.exe Token: SeSecurityPrivilege 1760 msiexec.exe Token: SeTakeOwnershipPrivilege 1760 msiexec.exe Token: SeLoadDriverPrivilege 1760 msiexec.exe Token: SeSystemProfilePrivilege 1760 msiexec.exe Token: SeSystemtimePrivilege 1760 msiexec.exe Token: SeProfSingleProcessPrivilege 1760 msiexec.exe Token: SeIncBasePriorityPrivilege 1760 msiexec.exe Token: SeCreatePagefilePrivilege 1760 msiexec.exe Token: SeCreatePermanentPrivilege 1760 msiexec.exe Token: SeBackupPrivilege 1760 msiexec.exe Token: SeRestorePrivilege 1760 msiexec.exe Token: SeShutdownPrivilege 1760 msiexec.exe Token: SeDebugPrivilege 1760 msiexec.exe Token: SeAuditPrivilege 1760 msiexec.exe Token: SeSystemEnvironmentPrivilege 1760 msiexec.exe Token: SeChangeNotifyPrivilege 1760 msiexec.exe Token: SeRemoteShutdownPrivilege 1760 msiexec.exe Token: SeUndockPrivilege 1760 msiexec.exe Token: SeSyncAgentPrivilege 1760 msiexec.exe Token: SeEnableDelegationPrivilege 1760 msiexec.exe Token: SeManageVolumePrivilege 1760 msiexec.exe Token: SeImpersonatePrivilege 1760 msiexec.exe Token: SeCreateGlobalPrivilege 1760 msiexec.exe Token: SeCreateTokenPrivilege 1760 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
msiexec.exepid process 1760 msiexec.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
002.exepid process 1992 002.exe 1992 002.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
svchost.exepid process 588 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exeSetup.exesetup.exealiens.execmd.exemsiexec.exedescription pid process target process PID 684 wrote to memory of 1992 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 002.exe PID 684 wrote to memory of 1992 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 002.exe PID 684 wrote to memory of 1992 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 002.exe PID 684 wrote to memory of 1992 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe 002.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 684 wrote to memory of 1036 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe Setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1036 wrote to memory of 1916 1036 Setup.exe setup.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 1916 wrote to memory of 1600 1916 setup.exe aliens.exe PID 684 wrote to memory of 1176 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe jg2_2qua.exe PID 684 wrote to memory of 1176 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe jg2_2qua.exe PID 684 wrote to memory of 1176 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe jg2_2qua.exe PID 684 wrote to memory of 1176 684 43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe jg2_2qua.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 1760 1600 aliens.exe msiexec.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 944 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 896 1600 aliens.exe E128AF959BD8F940.exe PID 1600 wrote to memory of 1968 1600 aliens.exe cmd.exe PID 1600 wrote to memory of 1968 1600 aliens.exe cmd.exe PID 1600 wrote to memory of 1968 1600 aliens.exe cmd.exe PID 1600 wrote to memory of 1968 1600 aliens.exe cmd.exe PID 1968 wrote to memory of 1464 1968 cmd.exe PING.EXE PID 1968 wrote to memory of 1464 1968 cmd.exe PING.EXE PID 1968 wrote to memory of 1464 1968 cmd.exe PING.EXE PID 1968 wrote to memory of 1464 1968 cmd.exe PING.EXE PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe PID 920 wrote to memory of 2032 920 msiexec.exe MsiExec.exe
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵
- Suspicious use of UnmapMainImage
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}2⤵
-
C:\Users\Admin\AppData\Local\Temp\43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe"C:\Users\Admin\AppData\Local\Temp\43069e5aa6eb22a19b4384a4c365f66a795358897b7c6d150cdefb809bb2ba7f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\002.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\002.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\0\setup.exe"C:\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\0\setup.exe" -s3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\z2mk9vdia0gw\aliens.exe"C:\Program Files (x86)\z2mk9vdia0gw\aliens.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe /i "C:\Users\Admin\AppData\Local\Temp\gdiview.msi"5⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeC:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exe 0011 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"6⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeC:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exe 200 installp15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe6⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe7⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exe"6⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 37⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Program Files (x86)\z2mk9vdia0gw\aliens.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 36⤵
- Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding F3151CB281E9F1A571B16EA4E133DD86 C2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\z2mk9vdia0gw\aliens.exeMD5
6a7b8769a45a0464a7817cf439671be3
SHA17a31716fb0b81890919e91ddbb5ceea587fd28c4
SHA256b1fcfbd84e66b1105f5d38683bd4bfa27e2c9a3befd3398ed2fb0aad72834e6b
SHA512000b0543727c49bdaf64dcff66bfe15a709fdb199c0cb76ac09f46cb690c6acc6d946010a54838dbf7788095341178580b298970d2f203371459de55bbe4d89e
-
C:\Program Files (x86)\z2mk9vdia0gw\aliens.exeMD5
89477a71e078ec418d0db52f69429271
SHA12f09e864684c16dc6353c696f28bfdacd89ddb12
SHA256206984e9c514e2c9438e51185660b706e28f12e82be03cfc42f94f4a76c1908e
SHA51207463307dc4be4c1e02348e6140a7c4bb7a7532fcc57cb74506183a336319de2c6e5f15776cd5d2119fe84fdfdfa51b14a5d99f440435454901b09762723697e
-
C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeMD5
b5ef1d10e51517bd78653542fff31ad6
SHA1cbf046324687e1a5319ddadd70e48e7436d378b5
SHA256e8883858bba0b4213b2d36fbb5c2972727b932cdde4d2943705a4e63e44f9c74
SHA5127b752fddc0f791ed93bb1369c79e2410e98d3d486e022c064bbe131a5a1252c761ed29e967cce6c1d889d577d95323ead8ad6813c86f870484a38d2de4e6c371
-
C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeMD5
efff62032188748c231724b0aa014a69
SHA1558f9d5b608c42e2160a7bbc637b05921ebc0381
SHA2560841e97d90098294752dd09f9c8d9356d363fe91b0f2601bcec43282e95f90f1
SHA5122963e8c8794086eb2e7fb7f64ca7cd290a50e2a1d22f31b3013d4423094c52d55662916c9bb83f03c7ebd39ea3c8f9a046827b2421dbb9a91572a920c78dcb6c
-
C:\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeMD5
e4f043b3ec93a33127869ac27b4ee9d3
SHA1e3bb66c5f46eca3adf0905e0cf39ba16db86b329
SHA2562c04224053e3e8a6a566ee15cc76fcf709c07f7da5bac63ffe87270b3ec24b55
SHA5123224c42245f73e23df6542ffc0382d8efd71358c83237ad8451bf02cc41df37fb6c971b8bbbe9cf93573900b912c75bc9b9b1b8757228497e297b1dd3f2eff5a
-
C:\Users\Admin\AppData\Local\Temp\MSI36A.tmpMD5
84878b1a26f8544bda4e069320ad8e7d
SHA151c6ee244f5f2fa35b563bffb91e37da848a759c
SHA256809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444
SHA5124742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
C:\Users\Admin\AppData\Local\Temp\gdiview.msiMD5
7cc103f6fd70c6f3a2d2b9fca0438182
SHA1699bd8924a27516b405ea9a686604b53b4e23372
SHA256dbd9f2128f0b92b21ef99a1d7a0f93f14ebe475dba436d8b1562677821b918a1
SHA51292ec9590e32a0cf810fc5d15ca9d855c86e5b8cb17cf45dd68bcb972bd78692436535adf9f510259d604e0a8ba2e25c6d2616df242261eb7b09a0ca5c6c2c128
-
C:\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\0\setup.exeMD5
a2f8f15dc02e62b14fc3d0c5a7444b8a
SHA14c98c38b142e6d264bc26aa7c3139074234f15b8
SHA256c552688299729c85e89d80402ea4ce82c7f7a09a1bf41aeb04c947e7abc32319
SHA512a35607796edb1d836a970f5280bb2af60384fd18fbd76c2f793409f591b4703baac17b3e82e3ce32a0d242bdffcab78e489046f80c85a8db873f8de68ea15160
-
C:\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\0\setup.exeMD5
a2f8f15dc02e62b14fc3d0c5a7444b8a
SHA14c98c38b142e6d264bc26aa7c3139074234f15b8
SHA256c552688299729c85e89d80402ea4ce82c7f7a09a1bf41aeb04c947e7abc32319
SHA512a35607796edb1d836a970f5280bb2af60384fd18fbd76c2f793409f591b4703baac17b3e82e3ce32a0d242bdffcab78e489046f80c85a8db873f8de68ea15160
-
\Program Files (x86)\z2mk9vdia0gw\aliens.exeMD5
fc200bba7322acaf27fa10d217c75afd
SHA136fe27e279118552a1e5a20d1bd27aa6f5197f22
SHA2566ac387291c05a9dcd11312bc95792283f1a2234331d8d52189b439cad1729c45
SHA5122e6c40fcd03e37663839dfcbed344ac4f3ef7ab16a970ddec75ad33dfeba8307d8346e8d5afc09861bfe60a6921959980e328da844a15d0dd9df85bf63a5e3a8
-
\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeMD5
43a84bf8450786eb29b37f6206379e8e
SHA1e363528d23fcddc1b8b7e8c3270e2d963a158315
SHA2560241092298fffa1ee3645d0fff52c5f50596c97225b574d7ad9841759d06634a
SHA5128f432652f40abfab235c8b35585ea891660605651b880b698c7e7c042f98eaaf0101769a9994869705c94f7d3529b2212b9f86ac0ea7184342bc7b3693ce67f5
-
\Users\Admin\AppData\Local\Temp\E128AF959BD8F940.exeMD5
3539a449e3a8aa2aa7beefb9cd1bf4fb
SHA18acb707179661f851b940dbd57d90e98031d4d4a
SHA256687964d0d74af9293d6b5e51b7719909fe47b0397d15f8e23e5dd11275ef4294
SHA5124b7003e257dce05806a7aa1a45175c0cdbc55c657c7f894325baa5120fa6f115a720a186ff6af8b71ec3a3ae52c8a8985e03e5e6832e9835c1bdcee7860edb9a
-
\Users\Admin\AppData\Local\Temp\MSI36A.tmpMD5
84878b1a26f8544bda4e069320ad8e7d
SHA151c6ee244f5f2fa35b563bffb91e37da848a759c
SHA256809aab5eace34dfbfb2b3d45462d42b34fcb95b415201d0d625414b56e437444
SHA5124742b84826961f590e0a2d6cc85a60b59ca4d300c58be5d0c33eb2315cefaf5627ae5ed908233ad51e188ce53ca861cf5cf8c1aa2620dc2667f83f98e627b549
-
\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
\Users\Admin\AppData\Local\Temp\RarSFX0\002.exeMD5
ddd8a43c5cd1d648af5bfbd67c718261
SHA137c915768cb12f54b60eac36cd4c008d7b3340b6
SHA256159d88ddd564a79129ae91354087369b36d27cad9bde5cc66ac50becae5e7786
SHA51208268136b5d1245ae4e828205ae4d6efec6845b4ed1507f44520a94f5746837781baddee3910f4b0b0c102b49e4ceceefd8cace686ca8dfed6605af4cf967efb
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exeMD5
bd5ddd337fd7221911525c12d802f557
SHA1b69a8b6d37ba121461dd3500f9e32a42c5bce64e
SHA256ec860d33de13219384d6be4a47f62c42247484671cda2740ce6f0da9e3201c17
SHA512dd51a1d90ceed56a427d198f47ba3ec6ea4146226623ea8c7feb65ae95a66dcebdc8f3ba33760af2e5a93b1417906ccf95ac52da7fa6f52e12d473407c2429ed
-
\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
\Users\Admin\AppData\Local\Temp\RarSFX0\jg2_2qua.exeMD5
19e76c8d8e32f57737165993b4ef11eb
SHA191cc156da1a552d50733b719ca085d0c707e09c9
SHA2567a29f94121eb09732cde47609a503f746deea9dbfd58333fef6309e1800b12ae
SHA5124945e9fefd2cc59a5ef5066b9249ee2ad8c314480d72a8b4043b72952973b6591d13de93574be68e3a2b29dd6190de55260ce2835d527b3edc59991f6ab561cd
-
\Users\Admin\AppData\Local\Temp\nsxCB7A.tmp\Sibuia.dllMD5
eb948284236e2d61eae0741280265983
SHA1d5180db7f54de24c27489b221095871a52dc9156
SHA256dbe5a7daf5bcff97f7c48f9b5476db3072cc85fbffd660adaff2e0455132d026
SHA5126d8087022ee62acd823cfa871b8b3e3251e44f316769dc04e2ad169e9df6a836dba95c3b268716f2397d6c6a3624a9e50dbe0bc847f3c4f3ef8e09bff30f2d75
-
\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\0\setup.exeMD5
a2f8f15dc02e62b14fc3d0c5a7444b8a
SHA14c98c38b142e6d264bc26aa7c3139074234f15b8
SHA256c552688299729c85e89d80402ea4ce82c7f7a09a1bf41aeb04c947e7abc32319
SHA512a35607796edb1d836a970f5280bb2af60384fd18fbd76c2f793409f591b4703baac17b3e82e3ce32a0d242bdffcab78e489046f80c85a8db873f8de68ea15160
-
\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\SibClr.dllMD5
928e680dea22c19febe9fc8e05d96472
SHA10a4a749ddfd220e2b646b878881575ff9352cf73
SHA2568b6b56f670d59ff93a1c7e601468127fc21f02dde567b5c21a5d53594cdaef94
SHA5125fbc72c3fa98dc2b5ad2ed556d2c6dc9279d4be3eb90ffd7fa2ada39cb976eba7cb34033e5786d1cb6137c64c869027002be2f2cad408acefd5c22006a1fef34
-
\Users\Admin\AppData\Local\Temp\sibCCC3.tmp\SibClr.dllMD5
928e680dea22c19febe9fc8e05d96472
SHA10a4a749ddfd220e2b646b878881575ff9352cf73
SHA2568b6b56f670d59ff93a1c7e601468127fc21f02dde567b5c21a5d53594cdaef94
SHA5125fbc72c3fa98dc2b5ad2ed556d2c6dc9279d4be3eb90ffd7fa2ada39cb976eba7cb34033e5786d1cb6137c64c869027002be2f2cad408acefd5c22006a1fef34
-
memory/292-163-0x0000000000000000-mapping.dmp
-
memory/344-146-0x0000000000000000-mapping.dmp
-
memory/588-168-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/588-164-0x0000000010000000-0x00000000100B9000-memory.dmpFilesize
740KB
-
memory/684-60-0x0000000075C71000-0x0000000075C73000-memory.dmpFilesize
8KB
-
memory/820-142-0x0000000000000000-mapping.dmp
-
memory/896-119-0x0000000000000000-mapping.dmp
-
memory/896-136-0x00000000035E0000-0x0000000003A43000-memory.dmpFilesize
4.4MB
-
memory/920-114-0x000007FEFB9F1000-0x000007FEFB9F3000-memory.dmpFilesize
8KB
-
memory/944-137-0x0000000003340000-0x00000000037A3000-memory.dmpFilesize
4.4MB
-
memory/944-116-0x0000000000000000-mapping.dmp
-
memory/1008-157-0x000000013F348270-mapping.dmp
-
memory/1008-162-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/1036-91-0x000000000E761000-0x000000000E762000-memory.dmpFilesize
4KB
-
memory/1036-83-0x000000000E8F0000-0x000000000E8F1000-memory.dmpFilesize
4KB
-
memory/1036-75-0x0000000000000000-mapping.dmp
-
memory/1036-80-0x000000000E760000-0x000000000E761000-memory.dmpFilesize
4KB
-
memory/1036-93-0x000000000E764000-0x000000000E765000-memory.dmpFilesize
4KB
-
memory/1036-94-0x000000000E765000-0x000000000E767000-memory.dmpFilesize
8KB
-
memory/1036-92-0x000000000E763000-0x000000000E764000-memory.dmpFilesize
4KB
-
memory/1036-85-0x0000000010DE0000-0x0000000010DE1000-memory.dmpFilesize
4KB
-
memory/1176-103-0x0000000000000000-mapping.dmp
-
memory/1296-151-0x000000013F198270-mapping.dmp
-
memory/1464-124-0x0000000000000000-mapping.dmp
-
memory/1600-108-0x0000000010000000-0x0000000010220000-memory.dmpFilesize
2.1MB
-
memory/1600-96-0x0000000000000000-mapping.dmp
-
memory/1676-150-0x0000000000000000-mapping.dmp
-
memory/1700-156-0x0000000000000000-mapping.dmp
-
memory/1700-167-0x0000000000000000-mapping.dmp
-
memory/1760-111-0x0000000000000000-mapping.dmp
-
memory/1772-149-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/1772-144-0x0000000010000000-0x0000000010057000-memory.dmpFilesize
348KB
-
memory/1772-143-0x000000013F288270-mapping.dmp
-
memory/1916-87-0x0000000000000000-mapping.dmp
-
memory/1968-123-0x0000000000000000-mapping.dmp
-
memory/1992-66-0x0000000000000000-mapping.dmp
-
memory/1992-69-0x0000000002BA0000-0x0000000002CA0000-memory.dmpFilesize
1024KB
-
memory/1992-70-0x0000000002140000-0x0000000002223000-memory.dmpFilesize
908KB
-
memory/2032-125-0x0000000000000000-mapping.dmp
-
memory/2860-170-0x0000000000000000-mapping.dmp