Analysis
-
max time kernel
85s -
max time network
73s -
platform
windows7_x64 -
resource
win7-ja-20210920 -
submitted
14-10-2021 17:58
Static task
static1
URLScan task
urlscan1
Sample
http://2.56.59.42/WW/file2.exe
Behavioral task
behavioral1
Sample
http://2.56.59.42/WW/file2.exe
Resource
win7-ja-20210920
General
-
Target
http://2.56.59.42/WW/file2.exe
-
Sample
211014-wkla7aahar
Malware Config
Extracted
smokeloader
2020
http://gfdjgdfjgdhfbg.space/
http://gfhjdsghdfjg23.space/
http://gdfjgdfh4543nf.space/
http://fgdjgsdfghj4fds.space/
http://fgdgdjfgfdgdf.space/
http://fsdhjfsdhfsd.space/
http://fgdsjghdfghjdfhgd.space/
http://ryuesrseyth3.space/
http://fdsjkuhreyu4.space/
http://fdgjdfgehr4.space/
http://fgdgjhdfgdfjgd.space/
Extracted
raccoon
3dde9cf1ea25ec8623cf240fe8d23e8d3fe465f0
-
url4cnc
http://telegatt.top/d1rolsavage
http://telegka.top/d1rolsavage
http://telegin.top/d1rolsavage
https://t.me/d1rolsavage
Extracted
vidar
41.4
1041
https://mas.to/@sslam
-
profile_id
1041
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Vidar Stealer 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2080-91-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/2080-95-0x00000000004A18CD-mapping.dmp family_vidar behavioral1/memory/2080-98-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar behavioral1/memory/2080-97-0x0000000000400000-0x00000000004D9000-memory.dmp family_vidar -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
file2.exeD0B7.exeD52B.exewaswdagpid process 2672 file2.exe 2812 D0B7.exe 2828 D52B.exe 2228 waswdag -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
waswdagfile2.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion waswdag Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion waswdag Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file2.exe -
Processes:
resource yara_rule C:\Users\Admin\Downloads\file2.exe themida C:\Users\Admin\Downloads\file2.exe themida C:\Users\Admin\AppData\Roaming\waswdag themida C:\Users\Admin\AppData\Roaming\waswdag themida -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Processes:
file2.exewaswdagdescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA waswdag -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
file2.exewaswdagpid process 2672 file2.exe 2228 waswdag -
Suspicious use of SetThreadContext 2 IoCs
Processes:
D0B7.exeD52B.exedescription pid process target process PID 2812 set thread context of 3052 2812 D0B7.exe AppLaunch.exe PID 2828 set thread context of 2080 2828 D52B.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2396 2080 WerFault.exe AppLaunch.exe 2416 3052 WerFault.exe AppLaunch.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
waswdagfile2.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI waswdag Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file2.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file2.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI file2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI waswdag Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI waswdag -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies registry class 36 IoCs
Processes:
description ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).y = "4294967295" Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).x = "4294967295" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MinPos1280x720x96(1).y = "4294967295" Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).left = "343" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616209" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\MaxPos1280x720x96(1).x = "4294967295" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).top = "54" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).right = "1143" Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "0" Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "4" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Set value (data) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WinPos1280x720x96(1).bottom = "654" Set value (int) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exefile2.exepid process 1544 chrome.exe 1464 chrome.exe 1464 chrome.exe 2100 chrome.exe 2292 chrome.exe 2672 file2.exe 2672 file2.exe 2672 file2.exe 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1284 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
file2.exewaswdagpid process 2672 file2.exe 1284 1284 1284 1284 1284 1284 2228 waswdag -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
WerFault.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeDebugPrivilege 2396 WerFault.exe Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeDebugPrivilege 2416 WerFault.exe Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 Token: SeShutdownPrivilege 1284 -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
chrome.exepid process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1284 -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
chrome.exepid process 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1464 chrome.exe 1284 1284 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 1464 wrote to memory of 1252 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1252 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1252 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1340 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1544 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1544 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 1544 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe PID 1464 wrote to memory of 2020 1464 chrome.exe chrome.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" http://2.56.59.42/WW/file2.exe1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ec4f50,0x7fef6ec4f60,0x7fef6ec4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1168 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1704 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2060 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2052 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2548 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3372 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3376 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3404 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3740 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4172 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3376 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3444 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3352 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3424 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3568 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3660 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3504 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4284 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4272 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4188 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4212 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1148,15276220713479880209,16837633798362201126,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3568 /prefetch:12⤵
-
C:\Users\Admin\Downloads\file2.exe"C:\Users\Admin\Downloads\file2.exe"1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D0B7.exeC:\Users\Admin\AppData\Local\Temp\D0B7.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3052 -s 4723⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\D52B.exeC:\Users\Admin\AppData\Local\Temp\D52B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 8443⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {F01E0ED5-BD77-4DEC-8139-C3C957E98891} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Roaming\waswdagC:\Users\Admin\AppData\Roaming\waswdag2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account-journalMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing CookiesMD5
1ff8950ff9c9c0e2ce1b5ca613e1b35b
SHA1d3353cfa2a4335beb006998099e0b0b42dc90593
SHA25677eb6cabb171b18e07249334d2f926e7627d5a8ef9fad7636498d7648607e827
SHA512af850ab64c1c2bceecf02526afd1a12808a95b4a55d91d0d197f99e26382388060c46a61819daf925775f2f0c927984771d095ae60cf169db5b7c10226effe46
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Safe Browsing Cookies-journalMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateMD5
fc9d2b9676b20cff5d3cf0de358f09e7
SHA15c990a055d2988a80bf9aa497d0e957ef8e16553
SHA25666d1f5d2e98e31376930da866bc4d8ae85de285370679cb47e70c489dfe0f628
SHA5128c27ed2f8c90b289904eb7ec1936f7977085cc7f4f07d56a22a1c681b4d61a75470ce981aa3cff3939b47fae56f921e8f5e52852d0d1b7b9a7bb7ea8c7d6729b
-
C:\Users\Admin\AppData\Local\Temp\D0B7.exeMD5
3af9e4825401dad74fff57c4d18bf34d
SHA1295602fb281d975ec2e1a9c87a6c1b1f18e24804
SHA2568bac6bc101c07c7eaacab8e9ed0a82a342ebd3c15cfedb9f19ed2f6c0cf30b00
SHA512bb1275edbd4597e8e110e01a15b77bc1acd4c32d5d24e50eb5cec093efe2fbf267cb14ef390b5e0c70e1f2e8a7b6a3de99ad1522e708782c7c520ba52b233b25
-
C:\Users\Admin\AppData\Local\Temp\D52B.exeMD5
b2a2ba8c53eb82a5a0391751b08b942a
SHA1f550a770c0cfe6fb227b19e10cec457bb8b70a39
SHA256ec68412e3d7d2e03fac2fd2b02ccb6050b9e2f0cbc19da5e8c54ed5fa343654e
SHA5127eefd4fc4d62d5219cb2dee38de86dbfedb71bc9ebf0626c2ff7e45c6cc23402d3f2fd1bb7ad173b99d7e63d33261a2f6cc90e7d915ec17945e7713e380ebf2f
-
C:\Users\Admin\AppData\Roaming\waswdagMD5
d7b39bc9ed3a77410619bbad61243ae6
SHA1d5e29c4b0eab182e511ef8b1513462cb5585c52b
SHA2560d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0
SHA512a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302
-
C:\Users\Admin\AppData\Roaming\waswdagMD5
d7b39bc9ed3a77410619bbad61243ae6
SHA1d5e29c4b0eab182e511ef8b1513462cb5585c52b
SHA2560d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0
SHA512a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302
-
C:\Users\Admin\Downloads\file2.exeMD5
d7b39bc9ed3a77410619bbad61243ae6
SHA1d5e29c4b0eab182e511ef8b1513462cb5585c52b
SHA2560d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0
SHA512a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302
-
C:\Users\Admin\Downloads\file2.exeMD5
d7b39bc9ed3a77410619bbad61243ae6
SHA1d5e29c4b0eab182e511ef8b1513462cb5585c52b
SHA2560d19634614b2abfc31984fca190a49a7cbf3c6a9ee38c0f9977b14dfb62087a0
SHA512a2ad488067a0f7fbc8e64ab18dc6a243419e7ae7360b9a53a96f1cd29e7f26ba8ebf1f896eb34b7ae1b12b47496fb6a93d2750fd613a6c81afe3e3ff10b09302
-
\??\pipe\crashpad_1464_RILISXRYQPDRMSBSMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1284-106-0x0000000004D30000-0x0000000004D46000-memory.dmpFilesize
88KB
-
memory/1284-56-0x0000000004CE0000-0x0000000004CF6000-memory.dmpFilesize
88KB
-
memory/2080-97-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2080-98-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2080-91-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2080-95-0x00000000004A18CD-mapping.dmp
-
memory/2080-90-0x0000000000400000-0x00000000004D9000-memory.dmpFilesize
868KB
-
memory/2228-100-0x0000000000000000-mapping.dmp
-
memory/2396-105-0x00000000002F0000-0x0000000000308000-memory.dmpFilesize
96KB
-
memory/2396-103-0x0000000000000000-mapping.dmp
-
memory/2416-107-0x0000000000000000-mapping.dmp
-
memory/2416-109-0x0000000000930000-0x0000000000948000-memory.dmpFilesize
96KB
-
memory/2672-55-0x0000000076481000-0x0000000076483000-memory.dmpFilesize
8KB
-
memory/2812-58-0x0000000000000000-mapping.dmp
-
memory/2828-60-0x0000000000000000-mapping.dmp
-
memory/2844-64-0x0000000075391000-0x0000000075393000-memory.dmpFilesize
8KB
-
memory/2844-62-0x0000000000000000-mapping.dmp
-
memory/2844-71-0x0000000000160000-0x00000000001D4000-memory.dmpFilesize
464KB
-
memory/2844-72-0x00000000000F0000-0x000000000015B000-memory.dmpFilesize
428KB
-
memory/2888-74-0x0000000000060000-0x000000000006C000-memory.dmpFilesize
48KB
-
memory/2888-70-0x0000000000000000-mapping.dmp
-
memory/2888-73-0x0000000000070000-0x0000000000077000-memory.dmpFilesize
28KB
-
memory/2996-78-0x00000000000F0000-0x0000000000112000-memory.dmpFilesize
136KB
-
memory/2996-77-0x0000000075221000-0x0000000075223000-memory.dmpFilesize
8KB
-
memory/2996-75-0x0000000000000000-mapping.dmp
-
memory/2996-79-0x00000000000C0000-0x00000000000E7000-memory.dmpFilesize
156KB
-
memory/3052-88-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3052-80-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3052-81-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/3052-86-0x000000000043E9BE-mapping.dmp
-
memory/3052-89-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB