Analysis
-
max time kernel
1788s -
max time network
1668s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
22-07-2021 23:25
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install.exe
Resource
win7v20210410
General
-
Target
setup_x86_x64_install.exe
-
Size
1.7MB
-
MD5
a0c815817a5d6cd64ad038e72dedaee8
-
SHA1
5f9d3eab51421cd8997d4f5715052ce89e23e940
-
SHA256
c017bcbebdb59082e79f2409c23e991948262e7645f191ee1c70c5d9ce3aa9c0
-
SHA512
237a6b85ff1d64b641c761e8280ca199c30592ff589a13279c835cfca016f5006fb44c7fea3b483f505479eafee56963776fee5ea9ae01b640dc88ab31456b78
Malware Config
Extracted
danabot
1987
4
142.11.244.124:443
142.11.206.50:443
-
embedded_hash
6AD9FE4F9E491E785665E0D144F61DAB
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Blocklisted process makes network request 10 IoCs
Processes:
WScript.exerundll32.exeRUNDLL32.EXEflow pid process 40 2868 WScript.exe 42 2868 WScript.exe 44 2868 WScript.exe 46 2868 WScript.exe 49 3724 rundll32.exe 50 1232 RUNDLL32.EXE 58 1232 RUNDLL32.EXE 59 1232 RUNDLL32.EXE 60 1232 RUNDLL32.EXE 61 1232 RUNDLL32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
Processes:
Melagrani.exe.comMelagrani.exe.comFyKwly.exe4.exevpn.exeSmartClock.exetsqjroryx.exepid process 2980 Melagrani.exe.com 1516 Melagrani.exe.com 1416 FyKwly.exe 3552 4.exe 2920 vpn.exe 2192 SmartClock.exe 2208 tsqjroryx.exe -
Drops startup file 1 IoCs
Processes:
4.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 3 IoCs
Processes:
FyKwly.exerundll32.exeRUNDLL32.EXEpid process 1416 FyKwly.exe 3724 rundll32.exe 1232 RUNDLL32.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 24 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RUNDLL32.EXEdescription pid process target process PID 1232 set thread context of 1868 1232 RUNDLL32.EXE rundll32.exe -
Drops file in Program Files directory 4 IoCs
Processes:
rundll32.exeFyKwly.exedescription ioc process File created C:\PROGRA~3\Jvgzbfh.tmp rundll32.exe File created C:\Program Files (x86)\foler\olader\acppage.dll FyKwly.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll FyKwly.exe File created C:\Program Files (x86)\foler\olader\acledit.dll FyKwly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RUNDLL32.EXEMelagrani.exe.comvpn.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Status RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Melagrani.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vpn.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Component Information RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\FeatureSet RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\VendorIdentifier RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 RUNDLL32.EXE Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\Configuration Data RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Previous Update Revision RUNDLL32.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\FeatureSet RUNDLL32.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Melagrani.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString vpn.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 RUNDLL32.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2096 timeout.exe -
Modifies registry class 1 IoCs
Processes:
vpn.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings vpn.exe -
Processes:
RUNDLL32.EXEWScript.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\1A6CDE58BD338FA1627DF4C24A3FD5384FFCDD3D\Blob = 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 RUNDLL32.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\1A6CDE58BD338FA1627DF4C24A3FD5384FFCDD3D RUNDLL32.EXE -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 2192 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exepid process 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 2136 powershell.exe 2136 powershell.exe 2136 powershell.exe 1232 RUNDLL32.EXE 1232 RUNDLL32.EXE 4060 powershell.exe 4060 powershell.exe 4060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
RUNDLL32.EXEpowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1232 RUNDLL32.EXE Token: SeDebugPrivilege 2136 powershell.exe Token: SeDebugPrivilege 4060 powershell.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Melagrani.exe.comRUNDLL32.EXEpid process 1516 Melagrani.exe.com 1516 Melagrani.exe.com 1232 RUNDLL32.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
setup_x86_x64_install.execmd.execmd.exeMelagrani.exe.comMelagrani.exe.comcmd.exeFyKwly.execmd.exe4.exevpn.exetsqjroryx.exerundll32.exeRUNDLL32.EXEpowershell.exedescription pid process target process PID 2016 wrote to memory of 2504 2016 setup_x86_x64_install.exe cmd.exe PID 2016 wrote to memory of 2504 2016 setup_x86_x64_install.exe cmd.exe PID 2016 wrote to memory of 2504 2016 setup_x86_x64_install.exe cmd.exe PID 2504 wrote to memory of 3788 2504 cmd.exe cmd.exe PID 2504 wrote to memory of 3788 2504 cmd.exe cmd.exe PID 2504 wrote to memory of 3788 2504 cmd.exe cmd.exe PID 3788 wrote to memory of 3860 3788 cmd.exe findstr.exe PID 3788 wrote to memory of 3860 3788 cmd.exe findstr.exe PID 3788 wrote to memory of 3860 3788 cmd.exe findstr.exe PID 3788 wrote to memory of 2980 3788 cmd.exe Melagrani.exe.com PID 3788 wrote to memory of 2980 3788 cmd.exe Melagrani.exe.com PID 3788 wrote to memory of 2980 3788 cmd.exe Melagrani.exe.com PID 3788 wrote to memory of 2760 3788 cmd.exe PING.EXE PID 3788 wrote to memory of 2760 3788 cmd.exe PING.EXE PID 3788 wrote to memory of 2760 3788 cmd.exe PING.EXE PID 2980 wrote to memory of 1516 2980 Melagrani.exe.com Melagrani.exe.com PID 2980 wrote to memory of 1516 2980 Melagrani.exe.com Melagrani.exe.com PID 2980 wrote to memory of 1516 2980 Melagrani.exe.com Melagrani.exe.com PID 1516 wrote to memory of 1508 1516 Melagrani.exe.com cmd.exe PID 1516 wrote to memory of 1508 1516 Melagrani.exe.com cmd.exe PID 1516 wrote to memory of 1508 1516 Melagrani.exe.com cmd.exe PID 1508 wrote to memory of 1416 1508 cmd.exe FyKwly.exe PID 1508 wrote to memory of 1416 1508 cmd.exe FyKwly.exe PID 1508 wrote to memory of 1416 1508 cmd.exe FyKwly.exe PID 1416 wrote to memory of 3552 1416 FyKwly.exe 4.exe PID 1416 wrote to memory of 3552 1416 FyKwly.exe 4.exe PID 1416 wrote to memory of 3552 1416 FyKwly.exe 4.exe PID 1416 wrote to memory of 2920 1416 FyKwly.exe vpn.exe PID 1416 wrote to memory of 2920 1416 FyKwly.exe vpn.exe PID 1416 wrote to memory of 2920 1416 FyKwly.exe vpn.exe PID 1516 wrote to memory of 2280 1516 Melagrani.exe.com cmd.exe PID 1516 wrote to memory of 2280 1516 Melagrani.exe.com cmd.exe PID 1516 wrote to memory of 2280 1516 Melagrani.exe.com cmd.exe PID 2280 wrote to memory of 2096 2280 cmd.exe timeout.exe PID 2280 wrote to memory of 2096 2280 cmd.exe timeout.exe PID 2280 wrote to memory of 2096 2280 cmd.exe timeout.exe PID 3552 wrote to memory of 2192 3552 4.exe SmartClock.exe PID 3552 wrote to memory of 2192 3552 4.exe SmartClock.exe PID 3552 wrote to memory of 2192 3552 4.exe SmartClock.exe PID 2920 wrote to memory of 2208 2920 vpn.exe tsqjroryx.exe PID 2920 wrote to memory of 2208 2920 vpn.exe tsqjroryx.exe PID 2920 wrote to memory of 2208 2920 vpn.exe tsqjroryx.exe PID 2920 wrote to memory of 3732 2920 vpn.exe WScript.exe PID 2920 wrote to memory of 3732 2920 vpn.exe WScript.exe PID 2920 wrote to memory of 3732 2920 vpn.exe WScript.exe PID 2208 wrote to memory of 3724 2208 tsqjroryx.exe rundll32.exe PID 2208 wrote to memory of 3724 2208 tsqjroryx.exe rundll32.exe PID 2208 wrote to memory of 3724 2208 tsqjroryx.exe rundll32.exe PID 2920 wrote to memory of 2868 2920 vpn.exe WScript.exe PID 2920 wrote to memory of 2868 2920 vpn.exe WScript.exe PID 2920 wrote to memory of 2868 2920 vpn.exe WScript.exe PID 3724 wrote to memory of 1232 3724 rundll32.exe RUNDLL32.EXE PID 3724 wrote to memory of 1232 3724 rundll32.exe RUNDLL32.EXE PID 3724 wrote to memory of 1232 3724 rundll32.exe RUNDLL32.EXE PID 1232 wrote to memory of 1868 1232 RUNDLL32.EXE rundll32.exe PID 1232 wrote to memory of 1868 1232 RUNDLL32.EXE rundll32.exe PID 1232 wrote to memory of 1868 1232 RUNDLL32.EXE rundll32.exe PID 1232 wrote to memory of 2136 1232 RUNDLL32.EXE powershell.exe PID 1232 wrote to memory of 2136 1232 RUNDLL32.EXE powershell.exe PID 1232 wrote to memory of 2136 1232 RUNDLL32.EXE powershell.exe PID 1232 wrote to memory of 4060 1232 RUNDLL32.EXE powershell.exe PID 1232 wrote to memory of 4060 1232 RUNDLL32.EXE powershell.exe PID 1232 wrote to memory of 4060 1232 RUNDLL32.EXE powershell.exe PID 4060 wrote to memory of 1268 4060 powershell.exe nslookup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Acre.aif2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^iYipZByhMrTrdVmiJmndvRgOTQTYMcgcdqPsDGYnRXoZnMWbADbAYDzdJadpIuBsPbNdyoErAZnnIffuTcnoYNvNGmHlfPQKvRlqZGssZxZZtUHxrldjIzawqZJGBxNKpNeQyguj$" Miro.aif4⤵
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.comMelagrani.exe.com M4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.com M5⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\FyKwly.exe"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\FyKwly.exe"C:\Users\Admin\AppData\Local\Temp\FyKwly.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"8⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"8⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tsqjroryx.exe"C:\Users\Admin\AppData\Local\Temp\tsqjroryx.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\TSQJRO~1.TMP,S C:\Users\Admin\AppData\Local\Temp\TSQJRO~1.EXE10⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\RUNDLL32.EXEC:\Windows\system32\RUNDLL32.EXE C:\Users\Admin\AppData\Local\Temp\TSQJRO~1.TMP,IBIOMjc=11⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exeC:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 3180112⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpDD4C.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmpF182.tmp.ps1"12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\nslookup.exe"C:\Windows\system32\nslookup.exe" -type=any localhost13⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /End /tn \Microsoft\Windows\Wininet\CacheTask12⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask12⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kfrjgmswf.vbs"9⤵
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fktpcqu.vbs"9⤵
- Blocklisted process makes network request
- Modifies system certificate store
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.com"6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\PROGRA~3\Jvgzbfh.tmpMD5
3eab04947d8261ac3be7fddaf09b61c7
SHA1a4410c768d30a220b5a867ac76ee146ec0b41d18
SHA256056f86bc687e37ee3429731f28d3debf28e638d84163dbf5182c1c7d8fac0d9d
SHA512fd57b14cf2f951a0ef631360c900a40172622423eda818ddf836268d7bece519fab4119656bce1138a860af95e0256c0c1f8014a7f17341209011775b6734dfa
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
47eebe401625bbc55e75dbfb72e9e89a
SHA1db3b2135942d2532c59b9788253638eb77e5995e
SHA256f1cd56000c44bbdb6880b5b133731f493fe8cba8198c5a861da6ae7b489ed0c3
SHA512590b149863d58be346e7927c28501375cc570858d2f156d234b03d68b86c5c0667a1038e2b6f6639172bf95638ca9f7c70f45270951abbcdf43b1be853b81d56
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
c82591d3d98bb0e6db65d73fe8b73881
SHA185c37ffa6a79d0bed42898f0f2b5faa130435d36
SHA2561a0e1b3b43be8e990743d7f1d2c01afa722b56908ed7851e6a305ca5e874b9a8
SHA512ef50666432f2db7c06b0d49624dca15c477565abdc56dc8aa4ef36874be934f4541b99e2c062edcf05311126496985fd48c1f1b8a410fd1c7ee7f3da047f8b79
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Acre.aifMD5
937474effdd599262b2f398fac08f388
SHA11ff41cb556bb689f460b2c8c186233afd8ed424c
SHA2562f76ddea8f492b4a87a086d19142cc49125991441fd9547c9a105ce38d65af95
SHA512f38a8a5fc9fdc44961d22177952b8332da463675a9f81d99f79f717cd5115764255f608fb2a17aea626c9eb300a040f066497406f735ec5d3b121cbb2df955df
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Avvelenate.aifMD5
74c29d62e84f3fe998327dc5dee5384c
SHA1cd982d331130fcd5841c50cf2f0c8c1fba6cbd22
SHA2567439f310fc85bd7cc26aec4d74020bbeb6a8c2d64d8860bcd0cbd7dc0e797adc
SHA512c966b7b935e200a1f06684cb733d59a28f586ba0e97d1235fd48be40a7bda07e7876c82b4d9cf5e5e76076c948c3f6efb87f31c47cb46176af1a808a445404f9
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\MMD5
bc07edebaf76de0033db62ea82d4bef4
SHA19392c0edf15f99272fb4fded79973cc12f04c5ee
SHA256fe9ebe6389b025640ed408606468a0dda75aeaeef2a87fad4d8707a5e9cf8162
SHA5122d7eff401e54cf1cd2a9fe2bffc6c378835dffaa873238fba8dbaad1a0b4d4b14d9b639f0d88e132ee216a8114c90e47175853cebeb3e22c2416e2b0486126da
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Melagrani.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Miro.aifMD5
6354bce948cc1f901609ea23a363055a
SHA166dd1f0006f27a9cb9f66ef64a207fb5dab815fa
SHA25642548ebb670a736f0071b0839cd5edbd123123e4141d35cb453311be9fef163a
SHA51204b8df20ba743501b2a7dcd128ae9f84a75ab054e8f65ff762d8a2f5643b59237d849a775e3945d8dab43ce93ce3205f15acebca8498c9500f276374343b2be4
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riscalda.aifMD5
bc07edebaf76de0033db62ea82d4bef4
SHA19392c0edf15f99272fb4fded79973cc12f04c5ee
SHA256fe9ebe6389b025640ed408606468a0dda75aeaeef2a87fad4d8707a5e9cf8162
SHA5122d7eff401e54cf1cd2a9fe2bffc6c378835dffaa873238fba8dbaad1a0b4d4b14d9b639f0d88e132ee216a8114c90e47175853cebeb3e22c2416e2b0486126da
-
C:\Users\Admin\AppData\Local\Temp\FyKwly.exeMD5
a6a8f833fdd0b5f4ee7b46714a3d20c7
SHA1bb056be49140db02baa6b03618d0fa4fdc14ea0f
SHA256c97d5d2645cc3028888156c99ddec9d67c3eb8812295d6f2fdd3f6e1a182f9a3
SHA512d237d4e6d17c31a19a633c88c11b47e63fcb9fee386ab1772103e068cf59c56ac2676184e17e612b1dc345b69643d65fa89ddcb7ea87dab8d593eb6867cc10aa
-
C:\Users\Admin\AppData\Local\Temp\FyKwly.exeMD5
a6a8f833fdd0b5f4ee7b46714a3d20c7
SHA1bb056be49140db02baa6b03618d0fa4fdc14ea0f
SHA256c97d5d2645cc3028888156c99ddec9d67c3eb8812295d6f2fdd3f6e1a182f9a3
SHA512d237d4e6d17c31a19a633c88c11b47e63fcb9fee386ab1772103e068cf59c56ac2676184e17e612b1dc345b69643d65fa89ddcb7ea87dab8d593eb6867cc10aa
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
14e173fe07917fef4e641eb80a2fa213
SHA13bdd028b2fccd6c774c21ddb9a3afc916b1d06df
SHA256da4e48e3137b9bd0bfd3a9da5e205f93125bec8f4852336c07e3813fe0875679
SHA5120102f8a53d564bcfa5ee328e9e5ee9f440919adae986e7b15674960c3af435cad1eefc684392cf918e9b6870995cf44f7860c49f219d4617922a1dcabcb9483c
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exeMD5
14e173fe07917fef4e641eb80a2fa213
SHA13bdd028b2fccd6c774c21ddb9a3afc916b1d06df
SHA256da4e48e3137b9bd0bfd3a9da5e205f93125bec8f4852336c07e3813fe0875679
SHA5120102f8a53d564bcfa5ee328e9e5ee9f440919adae986e7b15674960c3af435cad1eefc684392cf918e9b6870995cf44f7860c49f219d4617922a1dcabcb9483c
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exeMD5
4db8c2308b5ab9c8b43d8111272d1d1a
SHA18a556d2c045865033e230e16c69e406341ce602f
SHA25689dc7453ef96644bae0d1c9419681d0587ec68ab08cd6fbb27599b798cc608c5
SHA51236367a26e5b02c9977a5a63cd9ae102a612e426253ef18ca8acf4e48369b8a61a0c9b6631a8f5fef1f1a09dec8204d95fff06b5dbd94b9d04b7892c8c6c8d423
-
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exeMD5
4db8c2308b5ab9c8b43d8111272d1d1a
SHA18a556d2c045865033e230e16c69e406341ce602f
SHA25689dc7453ef96644bae0d1c9419681d0587ec68ab08cd6fbb27599b798cc608c5
SHA51236367a26e5b02c9977a5a63cd9ae102a612e426253ef18ca8acf4e48369b8a61a0c9b6631a8f5fef1f1a09dec8204d95fff06b5dbd94b9d04b7892c8c6c8d423
-
C:\Users\Admin\AppData\Local\Temp\TSQJRO~1.TMPMD5
561d38f1dd7bca0c2312a267b5c46532
SHA1664e1382fc33bae1595a2acbf5ca7ed42e881fcb
SHA2568b8e4b6665be547c448f7d36922c2e8c445450d755b28166000375f245aad890
SHA512a7a02cb56cfa470e5aec0ee68268703fb7b08c9516aca6431ddcbe571554f511cb5c77a8a6b9340f0f54c73110d7d2c9ef0a7d3bc162330dd99017f3d5eceac5
-
C:\Users\Admin\AppData\Local\Temp\fktpcqu.vbsMD5
719b0543f2357259d7d9bece8aacde7e
SHA1172ef59cd9c1e415cc9c2de1aab5393d01ce58dd
SHA256007e64b0066f316aa8de12fb40999efdc25ef92f93c7de0040fcd4dd4736e403
SHA51255a814ddb212c4a8d9f1573874127109fa1d47defed54e0322e816c8fc96dc46f448f0559ea200353f7dfe9d1e5191f84ee4d889a6bb8aec18077f560de98d7e
-
C:\Users\Admin\AppData\Local\Temp\kfrjgmswf.vbsMD5
5293a729d50ab9c3f141775590760b6b
SHA1f18a3b6d5da6778434685c6c1e55a31be5ffc432
SHA256c016dfd594e04f35d55f4c8c118a0f11582d77a52107ce1cc53528689a1a4979
SHA512e6b8490bb59804dca049ec077d1479f31d7658cf903da1f66cb5dd12f760d01b56907972335c4bbc591a4debe941df9f29c9dc80b845ad2233f289f4d5c2461a
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\FXGVXM~1.ZIPMD5
515b5d1e2d42755e2acd6b8907c2f1d5
SHA1eed75f204bb5c83a53dd8a5ca2b06493fce3880f
SHA2566c51c98f02829817111ec44f757f15bdd0fdbb31d7e37de830e3846667cd8b47
SHA512d438acc4af2835d232cf11b6b9ce629e0543c97296e1d007c14bfe2492058f0173e4c1191beffbd072a52cad0b942c644691c448921ba8857038ea1c7d678a1e
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\YOREDR~1.ZIPMD5
1dd4279f541dab6cc5b8c29099a6b259
SHA10b56867486acbf51940b87af90b261ef00bac953
SHA256e2bea2962ce669ecb5c93f8324ab84acdb2dfcd7f40d876b9be920b1559f583b
SHA51246021d4fbc9e5f8e6b624161eb32628fbc1f1651ee6b47fe1788e981e342089a764752fe39d5eeacb99bb7aaa53ec4dff2e6e9a63de782dfdab6ad964c4f99b2
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\_Files\_INFOR~1.TXTMD5
08fae9fc35cfbd61cda5ca2eefe944db
SHA1ac991b6226a365a15189744d9949bde5397a5365
SHA256e94ef4940467954c50bcdf4560738d1b5240950a9a44ec7d32fd85130eca238f
SHA512a714b9744353b1ebe981a1609fb23e9a4467df44e0fe5bd6eac8a134f15f047ac7af2f8c30819f9d469c31be03c06442057906532df52359cd48eac05c8fc9bc
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\_Files\_SCREE~1.JPEMD5
ce5d98ad47e11185b9053cc965d9cf81
SHA1984debf3333ca4ca6defde805cadceca78161771
SHA256e5dce8c076ccc0c2d4064a50d292ebbde55bb68f552dd9647cb166fe282270d1
SHA5129fa44d7211944fa039b975eb3c1d596c97e0a2b75f3d459f15491570655825b9de30a381a0013a7aea02cddb5f8c429d52b4cd5ea32108282b024dba643dbf58
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\files_\SCREEN~1.JPGMD5
ce5d98ad47e11185b9053cc965d9cf81
SHA1984debf3333ca4ca6defde805cadceca78161771
SHA256e5dce8c076ccc0c2d4064a50d292ebbde55bb68f552dd9647cb166fe282270d1
SHA5129fa44d7211944fa039b975eb3c1d596c97e0a2b75f3d459f15491570655825b9de30a381a0013a7aea02cddb5f8c429d52b4cd5ea32108282b024dba643dbf58
-
C:\Users\Admin\AppData\Local\Temp\pZuVLGlysEERO\files_\SYSTEM~1.TXTMD5
351bcd148fa46ff4528683ca2d5543b5
SHA1fefd2a04131709f732e707596e07cdbb94d94bc6
SHA256cd6ed2c21e76698a681dc6400831ea5927de47c35f66e6a11b0a00f2eb215ef2
SHA51240cf66bb7cb9ee64c87c15152e27e0779ca2a1c1845b621be133915de65b19f4c6d1bdb0a072f102d2c8b674f00aa30bde5068949ea186da1437e52af073774e
-
C:\Users\Admin\AppData\Local\Temp\tmpDD4C.tmp.ps1MD5
5a75f5fb2a4bc5830526f0c4664a0cd1
SHA15b03d3195b9ac0bcda525223a988ccea13ce228b
SHA256e437f6cde4c106454922e722c63292bac291f9276b7a2e667f136e756a5ef87c
SHA51204b1ce77022021a7f952b2fb94dd417eba4b81d964c57f29d50a902db8ec44aa21c0468f16ddf44f1858dede8ef04915b286767836b417c136bf0135d7ad7de3
-
C:\Users\Admin\AppData\Local\Temp\tmpDD4D.tmpMD5
c416c12d1b2b1da8c8655e393b544362
SHA1fb1a43cd8e1c556c2d25f361f42a21293c29e447
SHA2560600d59103840dff210778179fdfba904dcb737a4bfdb35384608698c86ea046
SHA512cb6d3636be4330aa2fd577c3636d0b7165f92ee817e98f21180ba0c918eb76f4e38f025086593a0e508234ca981cfec2c53482b0e9cc0acfa885fefbdf89913c
-
C:\Users\Admin\AppData\Local\Temp\tmpF182.tmp.ps1MD5
8c9b66850eaf8f69d0881671d91a4c74
SHA180b26eca0c0658214a438e6ae6d6d2e144564fa3
SHA256d862cc387f4f5b94ddc3690f20a242dadca6b7dfc84b1217047a1d36c8a9d8df
SHA5125eae6deab8eef299f50d307c32d84e4ec038511c136ca99f202c01238f129c69d455fdf010b352c15c8ade86194dd12448dc994083d5a95ab2d3a2d5db0d89f8
-
C:\Users\Admin\AppData\Local\Temp\tmpF183.tmpMD5
1860260b2697808b80802352fe324782
SHA1f07b4cb6a8133d8dd942fc285d63cb3ce5a1ed6b
SHA2560c4bb6ae7726faa47aef8459bcf37bf9ca16f0b93fd52790932adaf7845d1fb1
SHA512d9fd458e2fe871e93199d7f3783133ded898d824024d9525e8c9af2af31892b13f3fb147d3bfda7dfd7659b7072f5cd1d6c3ebfe2dbf5893afd00e59a96aa94f
-
C:\Users\Admin\AppData\Local\Temp\tsqjroryx.exeMD5
708fe4f9ed7f28c4883ddd51aff258e2
SHA1df2bf5d0342faa19b4965753b1dd76b8486e495d
SHA2564b6c3dcfd9a9ed20005f6f7b3a8a4bc7d71d82592f8efa237568ffb723677d1c
SHA512d490c533db1823008a3905643f3acd2f3931decab95e7b3cb36bbf613288cb6ef8e29849c93ef367dd5a4ecc38ab96f9be45c7383f5d8d9405aa0b012af1c93d
-
C:\Users\Admin\AppData\Local\Temp\tsqjroryx.exeMD5
708fe4f9ed7f28c4883ddd51aff258e2
SHA1df2bf5d0342faa19b4965753b1dd76b8486e495d
SHA2564b6c3dcfd9a9ed20005f6f7b3a8a4bc7d71d82592f8efa237568ffb723677d1c
SHA512d490c533db1823008a3905643f3acd2f3931decab95e7b3cb36bbf613288cb6ef8e29849c93ef367dd5a4ecc38ab96f9be45c7383f5d8d9405aa0b012af1c93d
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
14e173fe07917fef4e641eb80a2fa213
SHA13bdd028b2fccd6c774c21ddb9a3afc916b1d06df
SHA256da4e48e3137b9bd0bfd3a9da5e205f93125bec8f4852336c07e3813fe0875679
SHA5120102f8a53d564bcfa5ee328e9e5ee9f440919adae986e7b15674960c3af435cad1eefc684392cf918e9b6870995cf44f7860c49f219d4617922a1dcabcb9483c
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
14e173fe07917fef4e641eb80a2fa213
SHA13bdd028b2fccd6c774c21ddb9a3afc916b1d06df
SHA256da4e48e3137b9bd0bfd3a9da5e205f93125bec8f4852336c07e3813fe0875679
SHA5120102f8a53d564bcfa5ee328e9e5ee9f440919adae986e7b15674960c3af435cad1eefc684392cf918e9b6870995cf44f7860c49f219d4617922a1dcabcb9483c
-
\Users\Admin\AppData\Local\Temp\TSQJRO~1.TMPMD5
561d38f1dd7bca0c2312a267b5c46532
SHA1664e1382fc33bae1595a2acbf5ca7ed42e881fcb
SHA2568b8e4b6665be547c448f7d36922c2e8c445450d755b28166000375f245aad890
SHA512a7a02cb56cfa470e5aec0ee68268703fb7b08c9516aca6431ddcbe571554f511cb5c77a8a6b9340f0f54c73110d7d2c9ef0a7d3bc162330dd99017f3d5eceac5
-
\Users\Admin\AppData\Local\Temp\TSQJRO~1.TMPMD5
561d38f1dd7bca0c2312a267b5c46532
SHA1664e1382fc33bae1595a2acbf5ca7ed42e881fcb
SHA2568b8e4b6665be547c448f7d36922c2e8c445450d755b28166000375f245aad890
SHA512a7a02cb56cfa470e5aec0ee68268703fb7b08c9516aca6431ddcbe571554f511cb5c77a8a6b9340f0f54c73110d7d2c9ef0a7d3bc162330dd99017f3d5eceac5
-
\Users\Admin\AppData\Local\Temp\nsj9B38.tmp\UAC.dllMD5
adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
memory/1232-189-0x0000000006240000-0x0000000006241000-memory.dmpFilesize
4KB
-
memory/1232-184-0x0000000004C90000-0x0000000005F26000-memory.dmpFilesize
18.6MB
-
memory/1232-174-0x0000000000000000-mapping.dmp
-
memory/1268-240-0x0000000000000000-mapping.dmp
-
memory/1416-129-0x0000000000000000-mapping.dmp
-
memory/1508-128-0x0000000000000000-mapping.dmp
-
memory/1516-124-0x0000000000000000-mapping.dmp
-
memory/1516-127-0x0000000000E00000-0x0000000000E01000-memory.dmpFilesize
4KB
-
memory/1868-191-0x00000296C4340000-0x00000296C44F1000-memory.dmpFilesize
1.7MB
-
memory/1868-185-0x00007FF7672F5FD0-mapping.dmp
-
memory/1868-190-0x0000000000F90000-0x0000000001130000-memory.dmpFilesize
1.6MB
-
memory/2096-150-0x0000000000000000-mapping.dmp
-
memory/2136-199-0x0000000004B90000-0x0000000004B91000-memory.dmpFilesize
4KB
-
memory/2136-222-0x0000000004B93000-0x0000000004B94000-memory.dmpFilesize
4KB
-
memory/2136-213-0x0000000009650000-0x0000000009651000-memory.dmpFilesize
4KB
-
memory/2136-212-0x0000000009370000-0x0000000009371000-memory.dmpFilesize
4KB
-
memory/2136-211-0x0000000009DE0000-0x0000000009DE1000-memory.dmpFilesize
4KB
-
memory/2136-206-0x0000000008720000-0x0000000008721000-memory.dmpFilesize
4KB
-
memory/2136-204-0x0000000008610000-0x0000000008611000-memory.dmpFilesize
4KB
-
memory/2136-203-0x0000000008830000-0x0000000008831000-memory.dmpFilesize
4KB
-
memory/2136-202-0x00000000076A0000-0x00000000076A1000-memory.dmpFilesize
4KB
-
memory/2136-201-0x0000000008050000-0x0000000008051000-memory.dmpFilesize
4KB
-
memory/2136-200-0x0000000004B92000-0x0000000004B93000-memory.dmpFilesize
4KB
-
memory/2136-188-0x0000000000000000-mapping.dmp
-
memory/2136-198-0x0000000007EA0000-0x0000000007EA1000-memory.dmpFilesize
4KB
-
memory/2136-197-0x0000000007E30000-0x0000000007E31000-memory.dmpFilesize
4KB
-
memory/2136-196-0x0000000007580000-0x0000000007581000-memory.dmpFilesize
4KB
-
memory/2136-194-0x0000000004B10000-0x0000000004B11000-memory.dmpFilesize
4KB
-
memory/2136-195-0x0000000007700000-0x0000000007701000-memory.dmpFilesize
4KB
-
memory/2192-151-0x0000000000000000-mapping.dmp
-
memory/2192-160-0x0000000000400000-0x00000000008A3000-memory.dmpFilesize
4.6MB
-
memory/2208-154-0x0000000000000000-mapping.dmp
-
memory/2208-164-0x0000000002760000-0x000000000285F000-memory.dmpFilesize
1020KB
-
memory/2208-165-0x0000000000400000-0x000000000097E000-memory.dmpFilesize
5.5MB
-
memory/2280-139-0x0000000000000000-mapping.dmp
-
memory/2504-114-0x0000000000000000-mapping.dmp
-
memory/2760-122-0x0000000000000000-mapping.dmp
-
memory/2868-166-0x0000000000000000-mapping.dmp
-
memory/2920-142-0x00000000008B0000-0x00000000009FA000-memory.dmpFilesize
1.3MB
-
memory/2920-136-0x0000000000000000-mapping.dmp
-
memory/2920-143-0x0000000000400000-0x00000000008A4000-memory.dmpFilesize
4.6MB
-
memory/2980-120-0x0000000000000000-mapping.dmp
-
memory/3552-141-0x0000000000400000-0x00000000008A3000-memory.dmpFilesize
4.6MB
-
memory/3552-140-0x00000000008E0000-0x0000000000906000-memory.dmpFilesize
152KB
-
memory/3552-133-0x0000000000000000-mapping.dmp
-
memory/3604-243-0x0000000000000000-mapping.dmp
-
memory/3724-245-0x0000000000000000-mapping.dmp
-
memory/3724-161-0x0000000000000000-mapping.dmp
-
memory/3724-177-0x0000000004A50000-0x0000000005CE6000-memory.dmpFilesize
18.6MB
-
memory/3732-157-0x0000000000000000-mapping.dmp
-
memory/3788-116-0x0000000000000000-mapping.dmp
-
memory/3860-117-0x0000000000000000-mapping.dmp
-
memory/4060-224-0x0000000006A22000-0x0000000006A23000-memory.dmpFilesize
4KB
-
memory/4060-231-0x00000000081F0000-0x00000000081F1000-memory.dmpFilesize
4KB
-
memory/4060-228-0x0000000007850000-0x0000000007851000-memory.dmpFilesize
4KB
-
memory/4060-223-0x0000000006A20000-0x0000000006A21000-memory.dmpFilesize
4KB
-
memory/4060-244-0x0000000006A23000-0x0000000006A24000-memory.dmpFilesize
4KB
-
memory/4060-216-0x0000000000000000-mapping.dmp