Analysis
-
max time kernel
31s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 15:17
Static task
static1
Behavioral task
behavioral1
Sample
d0e763139d8ae4919323f584a1750cfe.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
d0e763139d8ae4919323f584a1750cfe.exe
Resource
win10-en-20211014
General
-
Target
d0e763139d8ae4919323f584a1750cfe.exe
-
Size
46KB
-
MD5
d0e763139d8ae4919323f584a1750cfe
-
SHA1
09cd2fd8de9b4968c9ea154c5f71c3273fc74087
-
SHA256
8ecd99368b83efde6f0d0d538e135394c5aec47faf430e86c5d9449eb0c9f770
-
SHA512
bc2a9c9fc703cedec5dfe087fb36f5eadd9335420c07018c7dfcf2ed45296370cc37b4e8da5afbcf12831ed94037281a64f37fa90cf75adc61bfe11506fe7700
Malware Config
Extracted
C:\Boot\bg-BG\Read_Me.txt
http://mmeeiix2ejdwkmseycljetmpiwebdvgjts75c63camjofn2cjdoulzqd.onion/?101TVBYKBDK
https://yip.su/2QstD5
Signatures
-
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Nirsoft 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe Nirsoft C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe Nirsoft -
Executes dropped EXE 2 IoCs
Processes:
AdvancedRun.exeAdvancedRun.exepid process 4000 AdvancedRun.exe 1400 AdvancedRun.exe -
Processes:
d0e763139d8ae4919323f584a1750cfe.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" d0e763139d8ae4919323f584a1750cfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths d0e763139d8ae4919323f584a1750cfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Resources\Themes\aero\Shell\㬸㬎㬬㬻㬉㬇㬹㭌㬅㬉㬉㬎㬧㬹㬶\svchost.exe = "0" d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe = "0" d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d0e763139d8ae4919323f584a1750cfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" d0e763139d8ae4919323f584a1750cfe.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d0e763139d8ae4919323f584a1750cfe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d0e763139d8ae4919323f584a1750cfe.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini d0e763139d8ae4919323f584a1750cfe.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
d0e763139d8ae4919323f584a1750cfe.exedescription ioc process File opened (read-only) \??\F: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\H: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\K: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\Z: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\Q: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\W: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\R: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\S: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\B: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\Y: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\P: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\A: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\J: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\N: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\I: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\G: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\L: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\X: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\V: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\M: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\E: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\T: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\U: d0e763139d8ae4919323f584a1750cfe.exe File opened (read-only) \??\O: d0e763139d8ae4919323f584a1750cfe.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exepid process 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exedescription pid process target process PID 392 set thread context of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe -
Drops file in Program Files directory 64 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fr-FR\IPSEventLogMsg.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\IpsMigrationPlugin.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Java\jdk1.8.0_66\bin\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-string-l1-1-0.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\cs-CZ\tipresx.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVFileSystemMetadata.dll d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\OFFICE16\Office Setup Controller\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\System\en-US\wab32res.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\en.ttt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\is.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\DESIGNER\MSADDNDR.OLB d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\VC\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\System\ado\en-US\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hash d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\History.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.ru-ru.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.sk-sk.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\7z.exe d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.lt-lt.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Internet Explorer\en-US\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\micaut.dll d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\License.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\ink\tr-TR\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\ink\HWRCustomization\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\en-US\correct.avi d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ja-JP\InkObj.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\ink\ar-SA\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.en-us.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.nl-nl.dll d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\wab32res.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-dayi.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\System\fr-FR\wab32res.dll.mui d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-convert-l1-1-0.dll d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\de-DE\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Java\jdk1.8.0_66\db\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\SoftBlue.jpg d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\DESIGNER\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Google\Chrome\Application\89.0.4389.114\Extensions\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsjpn.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\microsoft shared\MSInfo\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Common Files\System\msadc\fr-FR\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xml d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hwrusalm.dat d0e763139d8ae4919323f584a1750cfe.exe File created C:\Program Files\Internet Explorer\images\Read_Me.txt d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\rtscom.dll d0e763139d8ae4919323f584a1750cfe.exe -
Drops file in Windows directory 3 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exeWerFault.exedescription ioc process File created C:\Windows\Resources\Themes\aero\Shell\㬸㬎㬬㬻㬉㬇㬹㭌㬅㬉㬉㬎㬧㬹㬶\svchost.exe d0e763139d8ae4919323f584a1750cfe.exe File opened for modification C:\Windows\Resources\Themes\aero\Shell\㬸㬎㬬㬻㬉㬇㬹㭌㬅㬉㬉㬎㬧㬹㬶\svchost.exe d0e763139d8ae4919323f584a1750cfe.exe File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3812 392 WerFault.exe d0e763139d8ae4919323f584a1750cfe.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AdvancedRun.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exed0e763139d8ae4919323f584a1750cfe.exepowershell.exeWerFault.exed0e763139d8ae4919323f584a1750cfe.exepid process 4000 AdvancedRun.exe 4000 AdvancedRun.exe 4000 AdvancedRun.exe 4000 AdvancedRun.exe 916 powershell.exe 3316 powershell.exe 3880 powershell.exe 1400 AdvancedRun.exe 1400 AdvancedRun.exe 1400 AdvancedRun.exe 1400 AdvancedRun.exe 3316 powershell.exe 3880 powershell.exe 916 powershell.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 392 d0e763139d8ae4919323f584a1750cfe.exe 2104 powershell.exe 2104 powershell.exe 3880 powershell.exe 916 powershell.exe 3316 powershell.exe 2104 powershell.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 3812 WerFault.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe 2816 d0e763139d8ae4919323f584a1750cfe.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exeAdvancedRun.exepowershell.exepowershell.exepowershell.exeAdvancedRun.exepowershell.exeWerFault.exedescription pid process Token: SeDebugPrivilege 392 d0e763139d8ae4919323f584a1750cfe.exe Token: SeDebugPrivilege 4000 AdvancedRun.exe Token: SeImpersonatePrivilege 4000 AdvancedRun.exe Token: SeDebugPrivilege 3880 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 3316 powershell.exe Token: SeDebugPrivilege 1400 AdvancedRun.exe Token: SeImpersonatePrivilege 1400 AdvancedRun.exe Token: SeDebugPrivilege 2104 powershell.exe Token: SeRestorePrivilege 3812 WerFault.exe Token: SeBackupPrivilege 3812 WerFault.exe Token: SeBackupPrivilege 3812 WerFault.exe Token: SeDebugPrivilege 3812 WerFault.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
d0e763139d8ae4919323f584a1750cfe.exeAdvancedRun.exedescription pid process target process PID 392 wrote to memory of 3316 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 3316 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 3316 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 3880 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 3880 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 3880 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 916 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 916 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 916 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 4000 392 d0e763139d8ae4919323f584a1750cfe.exe AdvancedRun.exe PID 392 wrote to memory of 4000 392 d0e763139d8ae4919323f584a1750cfe.exe AdvancedRun.exe PID 392 wrote to memory of 4000 392 d0e763139d8ae4919323f584a1750cfe.exe AdvancedRun.exe PID 4000 wrote to memory of 1400 4000 AdvancedRun.exe AdvancedRun.exe PID 4000 wrote to memory of 1400 4000 AdvancedRun.exe AdvancedRun.exe PID 4000 wrote to memory of 1400 4000 AdvancedRun.exe AdvancedRun.exe PID 392 wrote to memory of 2104 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 2104 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 2104 392 d0e763139d8ae4919323f584a1750cfe.exe powershell.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe PID 392 wrote to memory of 2816 392 d0e763139d8ae4919323f584a1750cfe.exe d0e763139d8ae4919323f584a1750cfe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe"C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe"1⤵
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\㬸㬎㬬㬻㬉㬇㬹㭌㬅㬉㬉㬎㬧㬹㬶\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Resources\Themes\aero\Shell\㬸㬎㬬㬻㬉㬇㬹㭌㬅㬉㬉㬎㬧㬹㬶\svchost.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exe" /SpecialRun 4101d8 40003⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe"C:\Users\Admin\AppData\Local\Temp\d0e763139d8ae4919323f584a1750cfe.exe"2⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 24762⤵
- Drops file in Windows directory
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\explorer.exeexplorer.exe1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
101343244d619fd29dc007b34351865b
SHA1a721bf0ee99f24b3e6c263033cfa02a63d4175cc
SHA256286038573287d04ce980461054d2377b71ab4eb8a37e466b38d120ad7f93a043
SHA5121a40055b9e2186d142059ab12afc82a21767f9fbfe98345be40f67619d128fb261f6afef74b25ba52b8f80480bb86e06006047de1b9505d5a65f7d7ee3ce0209
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
7247129cd0644457905b7d6bf17fd078
SHA1dbf9139b5a1b72141f170d2eae911bbbe7e128c8
SHA256dfa6e0d79449f29310b2a0400dc7fa5a3a6b08182233147a81902d1f80a0f8e4
SHA5129b1ebd7fe485811f10ec02778d90a7f7eccafa0231027b640b94eaed8408107051da7fcc4f17a9aa0eef900fa2595f44be7fd115331fb6da9b10076f5fcf87e0
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
6faff0ebd7c3554b8b1b66bdc7a8ed7f
SHA1cc38cfcd0b4265eb2200f105c9ae46b3809beb72
SHA256b5cf2e1865f49c705491963f07bbf48cd3a863e42e73c7f84b99e3edca282c3a
SHA512ab424cc9603699a5285b75527892cd20ca3209cc01c4191171e7463d149434bd877c5b2a34443bc44e7502b58e35e2ecafd56bfef8f5d496e2aea2037f7b439d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
276b7468dc942f409e2f4b79e6b92fa4
SHA11f55deab360871b08ee535d7a79d414791b27cb0
SHA2566fd17514ae202ffdb1d8c532cc38c8531d314d8b4d3172079aed45a197193713
SHA5120c45e6e33512d81ae6bcbf0ed9e3b60e105d82466ffc78f2d0fd8904ccb3c7022272fd5fb0236524212f5b92e142578157e9ecc790501cd4556dc05a063a8356
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
276b7468dc942f409e2f4b79e6b92fa4
SHA11f55deab360871b08ee535d7a79d414791b27cb0
SHA2566fd17514ae202ffdb1d8c532cc38c8531d314d8b4d3172079aed45a197193713
SHA5120c45e6e33512d81ae6bcbf0ed9e3b60e105d82466ffc78f2d0fd8904ccb3c7022272fd5fb0236524212f5b92e142578157e9ecc790501cd4556dc05a063a8356
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
0b5d94d20be9eecbaed3dddd04143f07
SHA1c677d0355f4cc7301075a554adc889bce502e15a
SHA2563c6f74219d419accdd3de0d14fa46ff290fd430eddcc5352deddd7de59b4928c
SHA512395e5d0f28819f773b8d53363b7df73cc976124d1accce104390fdb3f5ebf57d8bb357e616910c03e1a9d67985704592640e442bd637009e32086bb1b2088916
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheMD5
89e7dc9245f38459c195c094433cbee9
SHA171c367ff906f3e9a173ab43d24fd04fc5206b298
SHA2564188e9c1b3147ee9296754ef5c12fbcb673ab72a20211a4faa7352000df14305
SHA51273a1ee9f23ce246074fb549a10fbc1966be6d857f7d51b31594874b64320e60b8117c67ba6a47edfa5d6c4841ec274c0bfaf22df0150c79bbaca0bd71d4a8389
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
5ecc8012a831d83659aeab5f96919eeb
SHA153f2db72c3f0a90057fc3881b39dc16a2171f604
SHA2563435f8a308e628615b4140016d5010eb5fa315a55bf916f61aec2a389714ce74
SHA51243825c20fe32dead95d9add709ecd0f0dde76a96452915fe67bf1b573343e63511018497d713b7ff1fbee3426a368dfbe7e824c786b88f2f782638805066d249
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\Y3IYH23I\microsoft.windows[1].xmlMD5
1811d42735be8e7c2d199d04477ad91c
SHA1d8bbe744d644fc7073a7e79462a917fa0916a16d
SHA2566f1d66117c44c5751487511eff702d2950703bb7100595cd3d149c811b29a37c
SHA5122c3d67fbfb993278b33c28d97bdc33f33781edd88e19d4b14226946218b5c912b47134ddb8945feb66182f496215cfa7bcc06bc490ff984e5ec050ea09a52377
-
C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
C:\Users\Admin\AppData\Local\Temp\4b47e2ad-1636-4d3a-acfa-9bb387e6b560\AdvancedRun.exeMD5
17fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a
-
\??\M:\$RECYCLE.BIN\S-1-5-21-941723256-3451054534-3089625102-1000\desktop.iniMD5
a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88
-
memory/392-117-0x00000000051B0000-0x00000000051B1000-memory.dmpFilesize
4KB
-
memory/392-135-0x0000000005EC0000-0x0000000005EC1000-memory.dmpFilesize
4KB
-
memory/392-115-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/392-118-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/392-145-0x0000000005E80000-0x0000000005E81000-memory.dmpFilesize
4KB
-
memory/392-121-0x0000000005C60000-0x0000000005CD3000-memory.dmpFilesize
460KB
-
memory/392-122-0x00000000062A0000-0x00000000062A1000-memory.dmpFilesize
4KB
-
memory/916-131-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/916-163-0x0000000007880000-0x0000000007881000-memory.dmpFilesize
4KB
-
memory/916-278-0x00000000029B3000-0x00000000029B4000-memory.dmpFilesize
4KB
-
memory/916-141-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/916-154-0x00000000072D0000-0x00000000072D1000-memory.dmpFilesize
4KB
-
memory/916-157-0x00000000073C0000-0x00000000073C1000-memory.dmpFilesize
4KB
-
memory/916-125-0x0000000000000000-mapping.dmp
-
memory/916-136-0x0000000006A80000-0x0000000006A81000-memory.dmpFilesize
4KB
-
memory/916-166-0x0000000007C50000-0x0000000007C51000-memory.dmpFilesize
4KB
-
memory/916-253-0x000000007E550000-0x000000007E551000-memory.dmpFilesize
4KB
-
memory/916-133-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/916-142-0x00000000029B2000-0x00000000029B3000-memory.dmpFilesize
4KB
-
memory/916-191-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/1400-149-0x0000000000000000-mapping.dmp
-
memory/2104-249-0x000000007EA30000-0x000000007EA31000-memory.dmpFilesize
4KB
-
memory/2104-184-0x00000000048F2000-0x00000000048F3000-memory.dmpFilesize
4KB
-
memory/2104-183-0x00000000048F0000-0x00000000048F1000-memory.dmpFilesize
4KB
-
memory/2104-279-0x00000000048F3000-0x00000000048F4000-memory.dmpFilesize
4KB
-
memory/2104-175-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/2104-173-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/2104-169-0x0000000000000000-mapping.dmp
-
memory/2104-195-0x0000000004700000-0x0000000004701000-memory.dmpFilesize
4KB
-
memory/2816-174-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2816-185-0x0000000000400000-0x000000000041F000-memory.dmpFilesize
124KB
-
memory/2816-176-0x0000000000407CA0-mapping.dmp
-
memory/3316-144-0x0000000004E32000-0x0000000004E33000-memory.dmpFilesize
4KB
-
memory/3316-123-0x0000000000000000-mapping.dmp
-
memory/3316-260-0x000000007E3B0000-0x000000007E3B1000-memory.dmpFilesize
4KB
-
memory/3316-277-0x0000000004E33000-0x0000000004E34000-memory.dmpFilesize
4KB
-
memory/3316-190-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/3316-126-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/3316-127-0x0000000004CC0000-0x0000000004CC1000-memory.dmpFilesize
4KB
-
memory/3316-160-0x0000000008210000-0x0000000008211000-memory.dmpFilesize
4KB
-
memory/3316-130-0x0000000004DE0000-0x0000000004DE1000-memory.dmpFilesize
4KB
-
memory/3316-139-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/3880-280-0x0000000007463000-0x0000000007464000-memory.dmpFilesize
4KB
-
memory/3880-143-0x0000000007462000-0x0000000007463000-memory.dmpFilesize
4KB
-
memory/3880-140-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB
-
memory/3880-151-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/3880-129-0x00000000034B0000-0x00000000034B1000-memory.dmpFilesize
4KB
-
memory/3880-128-0x00000000034B0000-0x00000000034B1000-memory.dmpFilesize
4KB
-
memory/3880-170-0x0000000008910000-0x0000000008911000-memory.dmpFilesize
4KB
-
memory/3880-189-0x00000000034B0000-0x00000000034B1000-memory.dmpFilesize
4KB
-
memory/3880-124-0x0000000000000000-mapping.dmp
-
memory/3880-257-0x000000007E690000-0x000000007E691000-memory.dmpFilesize
4KB
-
memory/4000-146-0x0000000000000000-mapping.dmp