Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 08:10
Static task
static1
Behavioral task
behavioral1
Sample
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe
Resource
win10-en
General
-
Target
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe
-
Size
174KB
-
MD5
5db8c2f052051b00425330d4c4901ba3
-
SHA1
6f541e479971c9312f80c79ab360de26f8070b9f
-
SHA256
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d
-
SHA512
7dc3533e89beae065f9824d56b806998a9d9f09b5dd16f5b44e09b019b8b394386143de9046fa3f19fd50947d2d3806a72c4f8f6b5ccef563b9182179e931bcd
Malware Config
Extracted
smokeloader
2020
http://fazanaharahe1.xyz/
http://xandelissane2.xyz/
http://ustiassosale3.xyz/
http://cytheriata4.xyz/
http://ggiergionard5.xyz/
http://rrelleynaniy6.store/
http://danniemusoa7.store/
http://nastanizab8.store/
http://onyokandis9.store/
http://dmunaavank10.store/
http://gilmandros11.site/
http://cusanthana12.site/
http://willietjeana13.site/
http://ximusokall14.site/
http://blodinetisha15.site/
http://urydiahadyss16.club/
http://glasamaddama17.club/
http://marlingarly18.club/
http://alluvianna19.club/
http://xandirkaniel20.club/
Extracted
redline
exe
146.70.35.170:30905
Extracted
raccoon
e89524de1a131be43c3cc9ec324dabb6a9998c12
-
url4cnc
https://telete.in/httpnotdetect1
Extracted
redline
33
94.26.248.150:17618
Extracted
redline
MIX2
94.103.9.138:80
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 7 IoCs
Processes:
resource yara_rule behavioral1/memory/3952-138-0x0000000000400000-0x0000000000422000-memory.dmp family_redline behavioral1/memory/3952-139-0x000000000041C5D6-mapping.dmp family_redline behavioral1/memory/3952-150-0x0000000005320000-0x0000000005926000-memory.dmp family_redline behavioral1/memory/1908-192-0x0000000003F50000-0x0000000003F6F000-memory.dmp family_redline behavioral1/memory/1908-195-0x0000000004150000-0x000000000416E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\38FB.exe family_redline C:\Users\Admin\AppData\Local\Temp\38FB.exe family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Known Sinkhole Response Header
suricata: ET MALWARE Known Sinkhole Response Header
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
CD68.exeCD68.exeD6DE.exeE1DC.exeD6DE.exeEA2A.exeF779.exe574.exe28BD.exe3272.exe38FB.exepid process 2872 CD68.exe 800 CD68.exe 440 D6DE.exe 3456 E1DC.exe 3952 D6DE.exe 1700 EA2A.exe 3716 F779.exe 1908 574.exe 596 28BD.exe 816 3272.exe 1644 38FB.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
EA2A.exeF779.exe28BD.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EA2A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EA2A.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F779.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F779.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28BD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28BD.exe -
Deletes itself 1 IoCs
Processes:
pid process 3012 -
Loads dropped DLL 10 IoCs
Processes:
E1DC.exe3272.exepid process 3456 E1DC.exe 3456 E1DC.exe 3456 E1DC.exe 3456 E1DC.exe 3456 E1DC.exe 816 3272.exe 816 3272.exe 816 3272.exe 816 3272.exe 816 3272.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\EA2A.exe themida C:\Users\Admin\AppData\Local\Temp\EA2A.exe themida behavioral1/memory/1700-157-0x00000000010D0000-0x00000000010D1000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\F779.exe themida C:\Users\Admin\AppData\Local\Temp\F779.exe themida behavioral1/memory/3716-174-0x0000000000EE0000-0x0000000000EE1000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\28BD.exe themida C:\Users\Admin\AppData\Local\Temp\28BD.exe themida behavioral1/memory/596-231-0x0000000000C40000-0x0000000001337000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
28BD.exeEA2A.exeF779.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 28BD.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EA2A.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F779.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
EA2A.exeF779.exe28BD.exepid process 1700 EA2A.exe 3716 F779.exe 596 28BD.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exeCD68.exeD6DE.exedescription pid process target process PID 3992 set thread context of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 2872 set thread context of 800 2872 CD68.exe CD68.exe PID 440 set thread context of 3952 440 D6DE.exe D6DE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exeCD68.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CD68.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CD68.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI CD68.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
28BD.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 28BD.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 28BD.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 3468 timeout.exe 4072 timeout.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exepid process 520 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe 520 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 3012 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3012 -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exeCD68.exepid process 520 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe 800 CD68.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
D6DE.exeEA2A.exeF779.exe574.exedescription pid process Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeDebugPrivilege 3952 D6DE.exe Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeDebugPrivilege 1700 EA2A.exe Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeDebugPrivilege 3716 F779.exe Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeDebugPrivilege 1908 574.exe Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 Token: SeShutdownPrivilege 3012 Token: SeCreatePagefilePrivilege 3012 -
Suspicious use of FindShellTrayWindow 8 IoCs
Processes:
pid process 3012 3012 3012 3012 3012 3012 3012 3012 -
Suspicious use of WriteProcessMemory 59 IoCs
Processes:
c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exeCD68.exeD6DE.exeE1DC.execmd.exe28BD.execmd.exedescription pid process target process PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3992 wrote to memory of 520 3992 c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe PID 3012 wrote to memory of 2872 3012 CD68.exe PID 3012 wrote to memory of 2872 3012 CD68.exe PID 3012 wrote to memory of 2872 3012 CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 2872 wrote to memory of 800 2872 CD68.exe CD68.exe PID 3012 wrote to memory of 440 3012 D6DE.exe PID 3012 wrote to memory of 440 3012 D6DE.exe PID 3012 wrote to memory of 440 3012 D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 3012 wrote to memory of 3456 3012 E1DC.exe PID 3012 wrote to memory of 3456 3012 E1DC.exe PID 3012 wrote to memory of 3456 3012 E1DC.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 440 wrote to memory of 3952 440 D6DE.exe D6DE.exe PID 3012 wrote to memory of 1700 3012 EA2A.exe PID 3012 wrote to memory of 1700 3012 EA2A.exe PID 3012 wrote to memory of 1700 3012 EA2A.exe PID 3012 wrote to memory of 3716 3012 F779.exe PID 3012 wrote to memory of 3716 3012 F779.exe PID 3012 wrote to memory of 3716 3012 F779.exe PID 3012 wrote to memory of 1908 3012 574.exe PID 3012 wrote to memory of 1908 3012 574.exe PID 3012 wrote to memory of 1908 3012 574.exe PID 3456 wrote to memory of 2576 3456 E1DC.exe cmd.exe PID 3456 wrote to memory of 2576 3456 E1DC.exe cmd.exe PID 3456 wrote to memory of 2576 3456 E1DC.exe cmd.exe PID 2576 wrote to memory of 3468 2576 cmd.exe timeout.exe PID 2576 wrote to memory of 3468 2576 cmd.exe timeout.exe PID 2576 wrote to memory of 3468 2576 cmd.exe timeout.exe PID 3012 wrote to memory of 596 3012 28BD.exe PID 3012 wrote to memory of 596 3012 28BD.exe PID 3012 wrote to memory of 596 3012 28BD.exe PID 3012 wrote to memory of 816 3012 3272.exe PID 3012 wrote to memory of 816 3012 3272.exe PID 3012 wrote to memory of 816 3012 3272.exe PID 3012 wrote to memory of 1644 3012 38FB.exe PID 3012 wrote to memory of 1644 3012 38FB.exe PID 3012 wrote to memory of 1644 3012 38FB.exe PID 596 wrote to memory of 2324 596 28BD.exe cmd.exe PID 596 wrote to memory of 2324 596 28BD.exe cmd.exe PID 596 wrote to memory of 2324 596 28BD.exe cmd.exe PID 2324 wrote to memory of 4072 2324 cmd.exe timeout.exe PID 2324 wrote to memory of 4072 2324 cmd.exe timeout.exe PID 2324 wrote to memory of 4072 2324 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe"C:\Users\Admin\AppData\Local\Temp\c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe"C:\Users\Admin\AppData\Local\Temp\c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\CD68.exeC:\Users\Admin\AppData\Local\Temp\CD68.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\CD68.exeC:\Users\Admin\AppData\Local\Temp\CD68.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D6DE.exeC:\Users\Admin\AppData\Local\Temp\D6DE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\D6DE.exeC:\Users\Admin\AppData\Local\Temp\D6DE.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E1DC.exeC:\Users\Admin\AppData\Local\Temp\E1DC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /C timeout /T 10 /NOBREAK > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\E1DC.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /T 10 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\EA2A.exeC:\Users\Admin\AppData\Local\Temp\EA2A.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\F779.exeC:\Users\Admin\AppData\Local\Temp\F779.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\574.exeC:\Users\Admin\AppData\Local\Temp\574.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\28BD.exeC:\Users\Admin\AppData\Local\Temp\28BD.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\28BD.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\3272.exeC:\Users\Admin\AppData\Local\Temp\3272.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\38FB.exeC:\Users\Admin\AppData\Local\Temp\38FB.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\D6DE.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\28BD.exeMD5
5286f944c769d5dc97b4d0d4ae83c56d
SHA1836ac55696c0f53fcb38cd6fdeb3a2e6a2e5b06d
SHA256717190eb4edc11546b3ee8555b6c5ad8ee8aa72d3171e0460584fb182d69641d
SHA51295854f2d6dcaf422a9209a8476feccc73f33d94a7a515f10e2de78a52d0d371ff777584e9e443623f311fbd16bf3079ddd9c38f1e11d73a385fbd3c9923a2011
-
C:\Users\Admin\AppData\Local\Temp\28BD.exeMD5
5286f944c769d5dc97b4d0d4ae83c56d
SHA1836ac55696c0f53fcb38cd6fdeb3a2e6a2e5b06d
SHA256717190eb4edc11546b3ee8555b6c5ad8ee8aa72d3171e0460584fb182d69641d
SHA51295854f2d6dcaf422a9209a8476feccc73f33d94a7a515f10e2de78a52d0d371ff777584e9e443623f311fbd16bf3079ddd9c38f1e11d73a385fbd3c9923a2011
-
C:\Users\Admin\AppData\Local\Temp\3272.exeMD5
cc8487c7ed793e54f583f4bf6ed37ff4
SHA14c8093252e5064c7c853d14c645992f07349f70d
SHA256fc3bffb975ba99e23a17be13ebdbfaddfbc1f323cdeeb863d2cbfb2f59d0ea0e
SHA512e2e2b528f32a025075d2af6dbf38d5f74bcf4b6919dbf7e231a8e525c4ecc90526bc3dc61a1db09cc7267c8764292d8c9f21e74b53d15894328f0958666a1233
-
C:\Users\Admin\AppData\Local\Temp\3272.exeMD5
cc8487c7ed793e54f583f4bf6ed37ff4
SHA14c8093252e5064c7c853d14c645992f07349f70d
SHA256fc3bffb975ba99e23a17be13ebdbfaddfbc1f323cdeeb863d2cbfb2f59d0ea0e
SHA512e2e2b528f32a025075d2af6dbf38d5f74bcf4b6919dbf7e231a8e525c4ecc90526bc3dc61a1db09cc7267c8764292d8c9f21e74b53d15894328f0958666a1233
-
C:\Users\Admin\AppData\Local\Temp\38FB.exeMD5
8b970faa220072497b79f02731d02c4b
SHA1095e93310a341be698c076b404d35decbf1821ea
SHA2564389ed7a805087836cbfffec1d6287aa5ba69fcd7bf52f2a320a7facf0101e1e
SHA512cdf7cc6e54bd4ee559e303111a375facb0d72e818e16e2a4a701567106f6bd693df0cd383a1865a42490c1c6fb90f4b70e081585c65428b9616be290f122461f
-
C:\Users\Admin\AppData\Local\Temp\38FB.exeMD5
8b970faa220072497b79f02731d02c4b
SHA1095e93310a341be698c076b404d35decbf1821ea
SHA2564389ed7a805087836cbfffec1d6287aa5ba69fcd7bf52f2a320a7facf0101e1e
SHA512cdf7cc6e54bd4ee559e303111a375facb0d72e818e16e2a4a701567106f6bd693df0cd383a1865a42490c1c6fb90f4b70e081585c65428b9616be290f122461f
-
C:\Users\Admin\AppData\Local\Temp\574.exeMD5
697be8266f1ffb3ea981426cab20494a
SHA105cd49305891b3366b9a9727cec11448c72ca157
SHA2561e2e68019fdf698dad9e1a57b1302ba8f72e16c305096860b6118a9a2b344261
SHA512e1a2241fff7feb795113c36558a37e70cdb76d93e56882488d9bc1eda109b88cc8cc1226309ebfbc0ae3af98e27a04cee537f3290f07029b29bd9037a34eb55e
-
C:\Users\Admin\AppData\Local\Temp\574.exeMD5
697be8266f1ffb3ea981426cab20494a
SHA105cd49305891b3366b9a9727cec11448c72ca157
SHA2561e2e68019fdf698dad9e1a57b1302ba8f72e16c305096860b6118a9a2b344261
SHA512e1a2241fff7feb795113c36558a37e70cdb76d93e56882488d9bc1eda109b88cc8cc1226309ebfbc0ae3af98e27a04cee537f3290f07029b29bd9037a34eb55e
-
C:\Users\Admin\AppData\Local\Temp\CD68.exeMD5
5db8c2f052051b00425330d4c4901ba3
SHA16f541e479971c9312f80c79ab360de26f8070b9f
SHA256c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d
SHA5127dc3533e89beae065f9824d56b806998a9d9f09b5dd16f5b44e09b019b8b394386143de9046fa3f19fd50947d2d3806a72c4f8f6b5ccef563b9182179e931bcd
-
C:\Users\Admin\AppData\Local\Temp\CD68.exeMD5
5db8c2f052051b00425330d4c4901ba3
SHA16f541e479971c9312f80c79ab360de26f8070b9f
SHA256c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d
SHA5127dc3533e89beae065f9824d56b806998a9d9f09b5dd16f5b44e09b019b8b394386143de9046fa3f19fd50947d2d3806a72c4f8f6b5ccef563b9182179e931bcd
-
C:\Users\Admin\AppData\Local\Temp\CD68.exeMD5
5db8c2f052051b00425330d4c4901ba3
SHA16f541e479971c9312f80c79ab360de26f8070b9f
SHA256c7fdfc3d138a271d1cac97ac641010869f4a07a30c84288cae8e7e44b870e07d
SHA5127dc3533e89beae065f9824d56b806998a9d9f09b5dd16f5b44e09b019b8b394386143de9046fa3f19fd50947d2d3806a72c4f8f6b5ccef563b9182179e931bcd
-
C:\Users\Admin\AppData\Local\Temp\D6DE.exeMD5
738b711587f81a0d7e65c12157fc7f63
SHA1dbd5d5151a45c4f5730beeda625f5ab8418b7e1b
SHA256bb988d27e93d5e4967dca68facb4ce63ff278d64e662a2414b70cbb532ff170c
SHA51270ea884753b19fa2eb0f0905a88fea4d09fa619e2a958d5655f2244f7c80f5e3aed93a852504e9a93c35e1a7bd8da8a757b435f2fba0257e460738030fd0f3fd
-
C:\Users\Admin\AppData\Local\Temp\D6DE.exeMD5
738b711587f81a0d7e65c12157fc7f63
SHA1dbd5d5151a45c4f5730beeda625f5ab8418b7e1b
SHA256bb988d27e93d5e4967dca68facb4ce63ff278d64e662a2414b70cbb532ff170c
SHA51270ea884753b19fa2eb0f0905a88fea4d09fa619e2a958d5655f2244f7c80f5e3aed93a852504e9a93c35e1a7bd8da8a757b435f2fba0257e460738030fd0f3fd
-
C:\Users\Admin\AppData\Local\Temp\D6DE.exeMD5
738b711587f81a0d7e65c12157fc7f63
SHA1dbd5d5151a45c4f5730beeda625f5ab8418b7e1b
SHA256bb988d27e93d5e4967dca68facb4ce63ff278d64e662a2414b70cbb532ff170c
SHA51270ea884753b19fa2eb0f0905a88fea4d09fa619e2a958d5655f2244f7c80f5e3aed93a852504e9a93c35e1a7bd8da8a757b435f2fba0257e460738030fd0f3fd
-
C:\Users\Admin\AppData\Local\Temp\E1DC.exeMD5
19ca8392cd7994d20b14e493d2aff92e
SHA182777bc3b9608507edb6a3f428ad06dc27274542
SHA25606e6f384d569d1484e4e36abbf54b3a09df7a13d85fc33d5e18d13b91b649c4d
SHA5123a1af3c9cf3c1adb443f612145d73c916de75a64455dce7053f3d9c191b681f16df6942aaa68a47f33c20b35ddb0d2559afdb9d9afc4049cd79a335a72ac9a56
-
C:\Users\Admin\AppData\Local\Temp\E1DC.exeMD5
19ca8392cd7994d20b14e493d2aff92e
SHA182777bc3b9608507edb6a3f428ad06dc27274542
SHA25606e6f384d569d1484e4e36abbf54b3a09df7a13d85fc33d5e18d13b91b649c4d
SHA5123a1af3c9cf3c1adb443f612145d73c916de75a64455dce7053f3d9c191b681f16df6942aaa68a47f33c20b35ddb0d2559afdb9d9afc4049cd79a335a72ac9a56
-
C:\Users\Admin\AppData\Local\Temp\EA2A.exeMD5
604ba9fde3cb322f5284ac9d29f8a3a2
SHA16f274e9e373c2926bf4f1248dfc6b8c4a5a7fa7a
SHA2563b7c8c80c90efc1550b8f8a495c8f4712261a99578d60147b8f335ee11c0c3ac
SHA5123dacffe6371090877021b5a83ef72b3b13dd09e991c717ba3848d099f46d1ea00583816bc2a4db22fa4d185c5395dfb145ba812108987c9ee69720f02c01c394
-
C:\Users\Admin\AppData\Local\Temp\EA2A.exeMD5
604ba9fde3cb322f5284ac9d29f8a3a2
SHA16f274e9e373c2926bf4f1248dfc6b8c4a5a7fa7a
SHA2563b7c8c80c90efc1550b8f8a495c8f4712261a99578d60147b8f335ee11c0c3ac
SHA5123dacffe6371090877021b5a83ef72b3b13dd09e991c717ba3848d099f46d1ea00583816bc2a4db22fa4d185c5395dfb145ba812108987c9ee69720f02c01c394
-
C:\Users\Admin\AppData\Local\Temp\F779.exeMD5
d1538b6133b25af809af8ff176796e36
SHA190b55c262d3367bc057769e31f41c2232a8e6af3
SHA2568b596ea3b94f0a71ca113f0dc956d86e7de7130feaf538df2588357a91acc05f
SHA5120ded0836a96fff9dbbf473ce09b71a711214eab98d7cb2da105f57dbc9d3ff92317286ab28bac5ce947c0835cc71116360b6fdaa79800808a612f637884b0bb6
-
C:\Users\Admin\AppData\Local\Temp\F779.exeMD5
d1538b6133b25af809af8ff176796e36
SHA190b55c262d3367bc057769e31f41c2232a8e6af3
SHA2568b596ea3b94f0a71ca113f0dc956d86e7de7130feaf538df2588357a91acc05f
SHA5120ded0836a96fff9dbbf473ce09b71a711214eab98d7cb2da105f57dbc9d3ff92317286ab28bac5ce947c0835cc71116360b6fdaa79800808a612f637884b0bb6
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\LGWZRE~1.ZIPMD5
e9fc25002e205bd703788582e9d40c1c
SHA16e5e34d923989f0c6eab4f1b51e14787a3b21daf
SHA256a979f6e42b37d43f612d333e7155ad35c5f39b3cf8e80f7860c318847c93c541
SHA512342f04a5899edb0ddc3cab682377fb4a718443ed01090efd6802af5288e50dcbfedc6b4a4362895eb8b1244f4bbbf8b92789aa07afc8bba020572d6bf6fc9eba
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\OZONLH~1.ZIPMD5
6043eecafaccc208cceafcbc7869d226
SHA152cd9c3252315c3bc575a1b238f3999753021d28
SHA256c835b6e91b7c9d0eb06e124fc8c4b963f2a5c4be1d4eccadbd18d0a4304198c3
SHA5121fef03afa3599767884bc95f6d33a7fdddf75e5faa65330d14a4e5761898a1e25544eb5faae18308dd910fec902bf6e2308c26008348680bd4015eb0b9af2e4b
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\_Files\_INFOR~1.TXTMD5
4d239b3896e76afb51b0e387d5941e6b
SHA1a340a8a3b68c0dee586cc6ef587b3469b2c59c06
SHA256e21bfd97151729f6fa88fc823f37cae5db71ae81e4c33c1d71744ed9fe2767c4
SHA512c499f9ff8fd3dac6bf0ebbee0934bdd1014db057993859e445fde8f174ff62952aa3a561cc5a8ad3a2940271e1d466397dc91c9e1d210efe0a121ef72c1f7e74
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\_Files\_SCREE~1.JPEMD5
4a1072e5d7e9255cec75245e2cc715b3
SHA12e7e35c7f7711647546feb66a193821e45784e57
SHA2563acdb3ffd7566d69894109f4ab8db99b92d3796d32c0324733b1874ae3a4bd52
SHA5120cfe17731443b2330308c9866baf29692836457d68828492eac4ce10fcc389df8d591a6a6e7069b1f0eab67482c4cf6f6a82d63363450bd4fe6133b1591b2a38
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\files_\SCREEN~1.JPGMD5
4a1072e5d7e9255cec75245e2cc715b3
SHA12e7e35c7f7711647546feb66a193821e45784e57
SHA2563acdb3ffd7566d69894109f4ab8db99b92d3796d32c0324733b1874ae3a4bd52
SHA5120cfe17731443b2330308c9866baf29692836457d68828492eac4ce10fcc389df8d591a6a6e7069b1f0eab67482c4cf6f6a82d63363450bd4fe6133b1591b2a38
-
C:\Users\Admin\AppData\Local\Temp\XBEPWrrXXAY\files_\SYSTEM~1.TXTMD5
4d239b3896e76afb51b0e387d5941e6b
SHA1a340a8a3b68c0dee586cc6ef587b3469b2c59c06
SHA256e21bfd97151729f6fa88fc823f37cae5db71ae81e4c33c1d71744ed9fe2767c4
SHA512c499f9ff8fd3dac6bf0ebbee0934bdd1014db057993859e445fde8f174ff62952aa3a561cc5a8ad3a2940271e1d466397dc91c9e1d210efe0a121ef72c1f7e74
-
\Users\Admin\AppData\LocalLow\aD1rF3aM8r\freebl3.dllMD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
\Users\Admin\AppData\LocalLow\aD1rF3aM8r\mozglue.dllMD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
\Users\Admin\AppData\LocalLow\aD1rF3aM8r\nss3.dllMD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
\Users\Admin\AppData\LocalLow\aD1rF3aM8r\softokn3.dllMD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\LocalLow\sqlite3.dllMD5
f964811b68f9f1487c2b41e1aef576ce
SHA1b423959793f14b1416bc3b7051bed58a1034025f
SHA25683bc57dcf282264f2b00c21ce0339eac20fcb7401f7c5472c0cd0c014844e5f7
SHA512565b1a7291c6fcb63205907fcd9e72fc2e11ca945afc4468c378edba882e2f314c2ac21a7263880ff7d4b84c2a1678024c1ac9971ac1c1de2bfa4248ec0f98c4
-
\Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\freebl3.dllMD5
60acd24430204ad2dc7f148b8cfe9bdc
SHA1989f377b9117d7cb21cbe92a4117f88f9c7693d9
SHA2569876c53134dbbec4dcca67581f53638eba3fea3a15491aa3cf2526b71032da97
SHA512626c36e9567f57fa8ec9c36d96cbadede9c6f6734a7305ecfb9f798952bbacdfa33a1b6c4999ba5b78897dc2ec6f91870f7ec25b2ceacbaee4be942fe881db01
-
\Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\mozglue.dllMD5
eae9273f8cdcf9321c6c37c244773139
SHA18378e2a2f3635574c106eea8419b5eb00b8489b0
SHA256a0c6630d4012ae0311ff40f4f06911bcf1a23f7a4762ce219b8dffa012d188cc
SHA51206e43e484a89cea9ba9b9519828d38e7c64b040f44cdaeb321cbda574e7551b11fea139ce3538f387a0a39a3d8c4cba7f4cf03e4a3c98db85f8121c2212a9097
-
\Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\nss3.dllMD5
02cc7b8ee30056d5912de54f1bdfc219
SHA1a6923da95705fb81e368ae48f93d28522ef552fb
SHA2561989526553fd1e1e49b0fea8036822ca062d3d39c4cab4a37846173d0f1753d5
SHA5120d5dfcf4fb19b27246fa799e339d67cd1b494427783f379267fb2d10d615ffb734711bab2c515062c078f990a44a36f2d15859b1dacd4143dcc35b5c0cee0ef5
-
\Users\Admin\AppData\LocalLow\uS0wV5wY9qH3\softokn3.dllMD5
4e8df049f3459fa94ab6ad387f3561ac
SHA106ed392bc29ad9d5fc05ee254c2625fd65925114
SHA25625a4dae37120426ab060ebb39b7030b3e7c1093cc34b0877f223b6843b651871
SHA5123dd4a86f83465989b2b30c240a7307edd1b92d5c1d5c57d47eff287dc9daa7bace157017908d82e00be90f08ff5badb68019ffc9d881440229dcea5038f61cd6
-
memory/440-130-0x0000000004D30000-0x0000000004D31000-memory.dmpFilesize
4KB
-
memory/440-132-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/440-125-0x0000000000000000-mapping.dmp
-
memory/440-128-0x00000000004A0000-0x00000000004A1000-memory.dmpFilesize
4KB
-
memory/440-131-0x0000000002830000-0x0000000002831000-memory.dmpFilesize
4KB
-
memory/440-133-0x0000000004F90000-0x0000000004F91000-memory.dmpFilesize
4KB
-
memory/520-117-0x0000000000402E68-mapping.dmp
-
memory/520-116-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/596-231-0x0000000000C40000-0x0000000001337000-memory.dmpFilesize
7.0MB
-
memory/596-234-0x0000000077590000-0x000000007771E000-memory.dmpFilesize
1.6MB
-
memory/596-228-0x0000000000000000-mapping.dmp
-
memory/800-123-0x0000000000402E68-mapping.dmp
-
memory/816-241-0x00000000021A0000-0x00000000022EA000-memory.dmpFilesize
1.3MB
-
memory/816-254-0x0000000000400000-0x0000000002191000-memory.dmpFilesize
29.6MB
-
memory/816-238-0x0000000000000000-mapping.dmp
-
memory/1644-242-0x0000000000000000-mapping.dmp
-
memory/1644-255-0x0000000005310000-0x000000000580E000-memory.dmpFilesize
5.0MB
-
memory/1700-157-0x00000000010D0000-0x00000000010D1000-memory.dmpFilesize
4KB
-
memory/1700-152-0x0000000000000000-mapping.dmp
-
memory/1700-216-0x0000000007370000-0x0000000007371000-memory.dmpFilesize
4KB
-
memory/1700-165-0x00000000031A0000-0x00000000031A1000-memory.dmpFilesize
4KB
-
memory/1700-159-0x0000000077590000-0x000000007771E000-memory.dmpFilesize
1.6MB
-
memory/1908-195-0x0000000004150000-0x000000000416E000-memory.dmpFilesize
120KB
-
memory/1908-200-0x00000000001C0000-0x00000000001F0000-memory.dmpFilesize
192KB
-
memory/1908-192-0x0000000003F50000-0x0000000003F6F000-memory.dmpFilesize
124KB
-
memory/1908-203-0x0000000000400000-0x0000000002163000-memory.dmpFilesize
29.4MB
-
memory/1908-201-0x00000000067D4000-0x00000000067D6000-memory.dmpFilesize
8KB
-
memory/1908-204-0x00000000067D0000-0x00000000067D1000-memory.dmpFilesize
4KB
-
memory/1908-208-0x00000000067D3000-0x00000000067D4000-memory.dmpFilesize
4KB
-
memory/1908-207-0x00000000067D2000-0x00000000067D3000-memory.dmpFilesize
4KB
-
memory/1908-183-0x0000000000000000-mapping.dmp
-
memory/2324-267-0x0000000000000000-mapping.dmp
-
memory/2576-188-0x0000000000000000-mapping.dmp
-
memory/2872-119-0x0000000000000000-mapping.dmp
-
memory/3012-118-0x0000000002890000-0x00000000028A6000-memory.dmpFilesize
88KB
-
memory/3012-148-0x00000000008A0000-0x00000000008B6000-memory.dmpFilesize
88KB
-
memory/3456-149-0x0000000000400000-0x0000000002194000-memory.dmpFilesize
29.6MB
-
memory/3456-134-0x0000000000000000-mapping.dmp
-
memory/3456-137-0x0000000003E30000-0x0000000003EBF000-memory.dmpFilesize
572KB
-
memory/3468-191-0x0000000000000000-mapping.dmp
-
memory/3716-182-0x0000000003CC0000-0x0000000003CC1000-memory.dmpFilesize
4KB
-
memory/3716-181-0x0000000077590000-0x000000007771E000-memory.dmpFilesize
1.6MB
-
memory/3716-174-0x0000000000EE0000-0x0000000000EE1000-memory.dmpFilesize
4KB
-
memory/3716-166-0x0000000000000000-mapping.dmp
-
memory/3952-146-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/3952-144-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/3952-199-0x00000000071B0000-0x00000000071B1000-memory.dmpFilesize
4KB
-
memory/3952-186-0x0000000006CD0000-0x0000000006CD1000-memory.dmpFilesize
4KB
-
memory/3952-147-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/3952-151-0x0000000005470000-0x0000000005471000-memory.dmpFilesize
4KB
-
memory/3952-145-0x00000000053A0000-0x00000000053A1000-memory.dmpFilesize
4KB
-
memory/3952-150-0x0000000005320000-0x0000000005926000-memory.dmpFilesize
6.0MB
-
memory/3952-190-0x0000000006EA0000-0x0000000006EA1000-memory.dmpFilesize
4KB
-
memory/3952-139-0x000000000041C5D6-mapping.dmp
-
memory/3952-138-0x0000000000400000-0x0000000000422000-memory.dmpFilesize
136KB
-
memory/3952-187-0x00000000073D0000-0x00000000073D1000-memory.dmpFilesize
4KB
-
memory/3992-115-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/4072-274-0x0000000000000000-mapping.dmp