Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
31-10-2021 15:37
Static task
static1
Behavioral task
behavioral1
Sample
9289a1505dbfc636e9c89aab5b7172a6.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
9289a1505dbfc636e9c89aab5b7172a6.exe
Resource
win10-en-20210920
General
-
Target
9289a1505dbfc636e9c89aab5b7172a6.exe
-
Size
160KB
-
MD5
9289a1505dbfc636e9c89aab5b7172a6
-
SHA1
6d03dced14d1f5536f1b68253f3acd6e64e372c6
-
SHA256
ab3519a53d3aeecddbab52b811a78bb073fe83d91f9e861c53a501f1d3bfeb89
-
SHA512
eef2811cf8c20dd181dd180f47a2f82a9666075995837ca3c56af36906eaf2d698e77b0c60a6d8d5455311a0a28c1b6a7a87a822f8470ae3bcec7abb2740a410
Malware Config
Extracted
smokeloader
2020
http://honawey70.top/
http://wijibui00.top/
http://193.56.146.214/
https://193.56.146.214/
Extracted
amadey
2.81
185.215.113.45/g4MbvE/index.php
Extracted
redline
123123123
93.115.20.139:28978
Extracted
redline
V5
185.183.32.161:45391
Extracted
redline
SuperStar
185.215.113.29:36224
Extracted
raccoon
68e2d75238f7c69859792d206401b6bde2b2515c
-
url4cnc
http://telegalive.top/agrybirdsgamerept
http://toptelete.top/agrybirdsgamerept
http://telegraf.top/agrybirdsgamerept
https://t.me/agrybirdsgamerept
Extracted
raccoon
8dec62c1db2959619dca43e02fa46ad7bd606400
-
url4cnc
http://telegin.top/capibar
http://ttmirror.top/capibar
http://teletele.top/capibar
http://telegalive.top/capibar
http://toptelete.top/capibar
http://telegraf.top/capibar
https://t.me/capibar
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1756-137-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1756-139-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1756-138-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1092-148-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/1756-142-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/1756-140-0x0000000000418D32-mapping.dmp family_redline behavioral1/memory/2032-158-0x0000000000480000-0x000000000049C000-memory.dmp family_redline behavioral1/memory/1092-162-0x00000000000A8D4A-mapping.dmp family_redline behavioral1/memory/1092-164-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/1092-165-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/2032-163-0x00000000004A0000-0x00000000004BB000-memory.dmp family_redline behavioral1/memory/1636-205-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/1636-206-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/1636-207-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/1636-208-0x000000000043714E-mapping.dmp family_redline behavioral1/memory/1636-210-0x0000000000400000-0x000000000043C000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
4C5C.exe539D.exebifurcation.exebeadroll.exe4C5C.exe6141.exe6660.exetkools.exe6BBE.exe736D.exe736D.exe8AC5.exe8D93.exe9B2B.exe9E86.exe9B2B.exepid process 1840 4C5C.exe 1108 539D.exe 1208 bifurcation.exe 1504 beadroll.exe 704 4C5C.exe 1588 6141.exe 848 6660.exe 1160 tkools.exe 1776 6BBE.exe 1016 736D.exe 2032 736D.exe 2028 8AC5.exe 936 8D93.exe 1508 9B2B.exe 1600 9E86.exe 1636 9B2B.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
6660.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6660.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6660.exe -
Deletes itself 1 IoCs
Processes:
pid process 1268 -
Loads dropped DLL 9 IoCs
Processes:
cmd.exebifurcation.exe4C5C.exe6141.exe736D.exe9B2B.exepid process 912 cmd.exe 1208 bifurcation.exe 1208 bifurcation.exe 1208 bifurcation.exe 1208 bifurcation.exe 1840 4C5C.exe 1588 6141.exe 1016 736D.exe 1508 9B2B.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
6660.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6660.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
Processes:
beadroll.exe9B2B.exepid process 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1504 beadroll.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe 1508 9B2B.exe -
Suspicious use of SetThreadContext 6 IoCs
Processes:
9289a1505dbfc636e9c89aab5b7172a6.exe4C5C.exebeadroll.exe736D.exe6660.exe9B2B.exedescription pid process target process PID 268 set thread context of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 1840 set thread context of 704 1840 4C5C.exe 4C5C.exe PID 1504 set thread context of 1756 1504 beadroll.exe regsvcs.exe PID 1016 set thread context of 2032 1016 736D.exe 736D.exe PID 848 set thread context of 1092 848 6660.exe AppLaunch.exe PID 1508 set thread context of 1636 1508 9B2B.exe 9B2B.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9289a1505dbfc636e9c89aab5b7172a6.exe4C5C.exe6BBE.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9289a1505dbfc636e9c89aab5b7172a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4C5C.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4C5C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4C5C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BBE.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BBE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9289a1505dbfc636e9c89aab5b7172a6.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9289a1505dbfc636e9c89aab5b7172a6.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 6BBE.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
9289a1505dbfc636e9c89aab5b7172a6.exepid process 900 9289a1505dbfc636e9c89aab5b7172a6.exe 900 9289a1505dbfc636e9c89aab5b7172a6.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1268 -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
9289a1505dbfc636e9c89aab5b7172a6.exe4C5C.exe6BBE.exepid process 900 9289a1505dbfc636e9c89aab5b7172a6.exe 704 4C5C.exe 1776 6BBE.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
beadroll.exe9B2B.exeAppLaunch.exeregsvcs.exe736D.exe9B2B.exe9E86.exedescription pid process Token: SeDebugPrivilege 1504 beadroll.exe Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeDebugPrivilege 1508 9B2B.exe Token: SeDebugPrivilege 1092 AppLaunch.exe Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 Token: SeDebugPrivilege 1756 regsvcs.exe Token: SeDebugPrivilege 2032 736D.exe Token: SeDebugPrivilege 1636 9B2B.exe Token: SeDebugPrivilege 1600 9E86.exe Token: SeShutdownPrivilege 1268 Token: SeShutdownPrivilege 1268 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1268 1268 1268 1268 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 1268 1268 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9289a1505dbfc636e9c89aab5b7172a6.exe539D.execmd.exebifurcation.exe4C5C.exe6141.execmd.execmd.exedescription pid process target process PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 268 wrote to memory of 900 268 9289a1505dbfc636e9c89aab5b7172a6.exe 9289a1505dbfc636e9c89aab5b7172a6.exe PID 1268 wrote to memory of 1840 1268 4C5C.exe PID 1268 wrote to memory of 1840 1268 4C5C.exe PID 1268 wrote to memory of 1840 1268 4C5C.exe PID 1268 wrote to memory of 1840 1268 4C5C.exe PID 1268 wrote to memory of 1108 1268 539D.exe PID 1268 wrote to memory of 1108 1268 539D.exe PID 1268 wrote to memory of 1108 1268 539D.exe PID 1268 wrote to memory of 1108 1268 539D.exe PID 1108 wrote to memory of 912 1108 539D.exe cmd.exe PID 1108 wrote to memory of 912 1108 539D.exe cmd.exe PID 1108 wrote to memory of 912 1108 539D.exe cmd.exe PID 1108 wrote to memory of 912 1108 539D.exe cmd.exe PID 912 wrote to memory of 1208 912 cmd.exe bifurcation.exe PID 912 wrote to memory of 1208 912 cmd.exe bifurcation.exe PID 912 wrote to memory of 1208 912 cmd.exe bifurcation.exe PID 912 wrote to memory of 1208 912 cmd.exe bifurcation.exe PID 1208 wrote to memory of 1504 1208 bifurcation.exe beadroll.exe PID 1208 wrote to memory of 1504 1208 bifurcation.exe beadroll.exe PID 1208 wrote to memory of 1504 1208 bifurcation.exe beadroll.exe PID 1208 wrote to memory of 1504 1208 bifurcation.exe beadroll.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1840 wrote to memory of 704 1840 4C5C.exe 4C5C.exe PID 1268 wrote to memory of 1588 1268 6141.exe PID 1268 wrote to memory of 1588 1268 6141.exe PID 1268 wrote to memory of 1588 1268 6141.exe PID 1268 wrote to memory of 1588 1268 6141.exe PID 1588 wrote to memory of 1756 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1756 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1756 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1756 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1760 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1760 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1760 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1760 1588 6141.exe cmd.exe PID 1756 wrote to memory of 524 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 524 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 524 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 524 1756 cmd.exe cmd.exe PID 1588 wrote to memory of 1028 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1028 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1028 1588 6141.exe cmd.exe PID 1588 wrote to memory of 1028 1588 6141.exe cmd.exe PID 1756 wrote to memory of 1696 1756 cmd.exe cacls.exe PID 1756 wrote to memory of 1696 1756 cmd.exe cacls.exe PID 1756 wrote to memory of 1696 1756 cmd.exe cacls.exe PID 1756 wrote to memory of 1696 1756 cmd.exe cacls.exe PID 1588 wrote to memory of 980 1588 6141.exe cmd.exe PID 1588 wrote to memory of 980 1588 6141.exe cmd.exe PID 1588 wrote to memory of 980 1588 6141.exe cmd.exe PID 1588 wrote to memory of 980 1588 6141.exe cmd.exe PID 980 wrote to memory of 1992 980 cmd.exe cacls.exe PID 980 wrote to memory of 1992 980 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9289a1505dbfc636e9c89aab5b7172a6.exe"C:\Users\Admin\AppData\Local\Temp\9289a1505dbfc636e9c89aab5b7172a6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9289a1505dbfc636e9c89aab5b7172a6.exe"C:\Users\Admin\AppData\Local\Temp\9289a1505dbfc636e9c89aab5b7172a6.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4C5C.exeC:\Users\Admin\AppData\Local\Temp\4C5C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4C5C.exeC:\Users\Admin\AppData\Local\Temp\4C5C.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\539D.exeC:\Users\Admin\AppData\Local\Temp\539D.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\mannishly.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bifurcation.exebifurcation.exe -p"xicyqwllwklawixvurbiyphwsjuxiq"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exe"4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6141.exeC:\Users\Admin\AppData\Local\Temp\6141.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /P "Admin:N"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /P "Admin:R" /E2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /P "Admin:R" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c CACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8" /P "Admin:R" /E2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8" /P "Admin:R" /E3⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo Y|CACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8" /P "Admin:N"2⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "C:\Users\Admin\AppData\Local\Temp\2303a34fa8" /P "Admin:N"3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"3⤵
-
C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe"C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\2303a34fa8\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\6660.exeC:\Users\Admin\AppData\Local\Temp\6660.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\6BBE.exeC:\Users\Admin\AppData\Local\Temp\6BBE.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\736D.exeC:\Users\Admin\AppData\Local\Temp\736D.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\736D.exeC:\Users\Admin\AppData\Local\Temp\736D.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\8AC5.exeC:\Users\Admin\AppData\Local\Temp\8AC5.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\8D93.exeC:\Users\Admin\AppData\Local\Temp\8D93.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9B2B.exeC:\Users\Admin\AppData\Local\Temp\9B2B.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\9B2B.exe"C:\Users\Admin\AppData\Local\Temp\9B2B.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\9E86.exeC:\Users\Admin\AppData\Local\Temp\9E86.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {35BD4C64-74CF-482F-A6AD-AF9B3070D205} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15AMD5
d4ae187b4574036c2d76b6df8a8c1a30
SHA1b06f409fa14bab33cbaf4a37811b8740b624d9e5
SHA256a2ce3a0fa7d2a833d1801e01ec48e35b70d84f3467cc9f8fab370386e13879c7
SHA5121f44a360e8bb8ada22bc5bfe001f1babb4e72005a46bc2a94c33c4bd149ff256cce6f35d65ca4f7fc2a5b9e15494155449830d2809c8cf218d0b9196ec646b0c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
cf904355c3cdbc65945ecfa98afffb92
SHA1c7a040a451ee67485d260822dd0717375189eb34
SHA256559bf5810e1da85f8a8f3f9754e110a0889f4048e551026847c5d8bad81b6aa2
SHA512900368e349111c60d8524f347464dda1fb2099281b9b86095c36f5299f94c5a0b0627dfa9c704e40e6c7cbd8147a228390cce0484fbf0776ed310f415596e94b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15AMD5
11a759575ac647ae9f02242e7f805f0f
SHA1d968518213d42b1125c660740d1f5bc11bea06e4
SHA256bdebe2a76a2fb16b17f917cd4fd320edb117efe6ce6481be15042c0f485c6ba6
SHA512003d684481d9c2696c9e3190f73a31174e701415c62df88aebe155d5cd7f2e499f6ef1fe856c8528ea8288cc559504fde8eecd398f53c01d429e19b4f51af102
-
C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exeMD5
a1fc3d75ce6e2aea0f64f38a42f5b44e
SHA1c349aa7b9ab75c82456be18f0af3e86cea800447
SHA2562c9967236c0868dd758aa061c32c2b91785f6be9cc7ee6ce0cfa4528dd4da45e
SHA512118563b67d551a87e6a370780fd3b4ab3f7b967ec9328a018e9085f1f9a0d10c890bf533d53fbd249da0275a9c141b0071a4f7096c75e95d30b4cb83975b85b6
-
C:\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exeMD5
a1fc3d75ce6e2aea0f64f38a42f5b44e
SHA1c349aa7b9ab75c82456be18f0af3e86cea800447
SHA2562c9967236c0868dd758aa061c32c2b91785f6be9cc7ee6ce0cfa4528dd4da45e
SHA512118563b67d551a87e6a370780fd3b4ab3f7b967ec9328a018e9085f1f9a0d10c890bf533d53fbd249da0275a9c141b0071a4f7096c75e95d30b4cb83975b85b6
-
C:\Users\Admin\AppData\Local\Temp\4C5C.exeMD5
f240a0240746af43de96ce02bc9fb5c8
SHA10e962e42bda9d9524a225c6f98e1da3539c4a627
SHA256a706b4a7c2d2a38b2a417f05c34fc5585fc89e31b9ce50438673832a40583967
SHA5120318e5baaf5996ab367ad722480b0c801e93ee1f9e00bc783c39ccddf6fe80b31fd5da25fa8dce2236a26be1be79f0320905b5261b6cd7d0f48de0fbe555fe6a
-
C:\Users\Admin\AppData\Local\Temp\4C5C.exeMD5
f240a0240746af43de96ce02bc9fb5c8
SHA10e962e42bda9d9524a225c6f98e1da3539c4a627
SHA256a706b4a7c2d2a38b2a417f05c34fc5585fc89e31b9ce50438673832a40583967
SHA5120318e5baaf5996ab367ad722480b0c801e93ee1f9e00bc783c39ccddf6fe80b31fd5da25fa8dce2236a26be1be79f0320905b5261b6cd7d0f48de0fbe555fe6a
-
C:\Users\Admin\AppData\Local\Temp\4C5C.exeMD5
f240a0240746af43de96ce02bc9fb5c8
SHA10e962e42bda9d9524a225c6f98e1da3539c4a627
SHA256a706b4a7c2d2a38b2a417f05c34fc5585fc89e31b9ce50438673832a40583967
SHA5120318e5baaf5996ab367ad722480b0c801e93ee1f9e00bc783c39ccddf6fe80b31fd5da25fa8dce2236a26be1be79f0320905b5261b6cd7d0f48de0fbe555fe6a
-
C:\Users\Admin\AppData\Local\Temp\539D.exeMD5
18d419578479a4c3e32274d55818596c
SHA19487e78da59e2a1c7bbb7c4727a2d5ba0e696ea8
SHA256d5acf62e4887f49d54d18f13bf833514e9204ab0ffe1f325f00d554c467ed2fd
SHA51266a327e35b9c9477cd44ab4068afaeb02d2e700c3f470d62fff244fdbe7e0e5b9b2df449ef3701f041f976f6c999e84b7b46daf89a284540ad9ec21149fc4e8d
-
C:\Users\Admin\AppData\Local\Temp\539D.exeMD5
18d419578479a4c3e32274d55818596c
SHA19487e78da59e2a1c7bbb7c4727a2d5ba0e696ea8
SHA256d5acf62e4887f49d54d18f13bf833514e9204ab0ffe1f325f00d554c467ed2fd
SHA51266a327e35b9c9477cd44ab4068afaeb02d2e700c3f470d62fff244fdbe7e0e5b9b2df449ef3701f041f976f6c999e84b7b46daf89a284540ad9ec21149fc4e8d
-
C:\Users\Admin\AppData\Local\Temp\6141.exeMD5
a1fc3d75ce6e2aea0f64f38a42f5b44e
SHA1c349aa7b9ab75c82456be18f0af3e86cea800447
SHA2562c9967236c0868dd758aa061c32c2b91785f6be9cc7ee6ce0cfa4528dd4da45e
SHA512118563b67d551a87e6a370780fd3b4ab3f7b967ec9328a018e9085f1f9a0d10c890bf533d53fbd249da0275a9c141b0071a4f7096c75e95d30b4cb83975b85b6
-
C:\Users\Admin\AppData\Local\Temp\6141.exeMD5
a1fc3d75ce6e2aea0f64f38a42f5b44e
SHA1c349aa7b9ab75c82456be18f0af3e86cea800447
SHA2562c9967236c0868dd758aa061c32c2b91785f6be9cc7ee6ce0cfa4528dd4da45e
SHA512118563b67d551a87e6a370780fd3b4ab3f7b967ec9328a018e9085f1f9a0d10c890bf533d53fbd249da0275a9c141b0071a4f7096c75e95d30b4cb83975b85b6
-
C:\Users\Admin\AppData\Local\Temp\6660.exeMD5
8662153780bd75cc4a8ade420282a3fa
SHA1384ad3fadd55c0c80efc1db7324dce3c4cb61d80
SHA2566848188337cba0f6f78d4389e8b0d6746496d5523423aff8852e22cf6fd17d9c
SHA51221c530266263aeaeacdf86d4812c0cf8659d407b8468c3e3ba3714620a351df2181cad3ae101a659297d5c84252b8189e5aebaf7a1af77b1047a1ea4f1213d17
-
C:\Users\Admin\AppData\Local\Temp\6BBE.exeMD5
edb47033a08b69ea83df7cf97a6ca38d
SHA1bae7d7102d5a91afdba7593c4ca7a3877a0d8f10
SHA25642eab5e5388670ca9a7ce243823924a8668c6b07cdd3120c598d5bbd3b0a9620
SHA51298999affc4edec77e5921c51e8973ca514a679f2dc288de47150b5780bbfcb28c8c37a9cb3c345ab7f5125ef5caf8860a7b30f740d768fbc251d0dc3121f8287
-
C:\Users\Admin\AppData\Local\Temp\736D.exeMD5
43a0e04ea49d0bbba2a4385865147683
SHA14a04c008748bdd4b3472a5b068ef934353e5a8b7
SHA25618fabf656f45b9266522cccd48da832aa50ea4f5d753c060fdc8ccfd3df89906
SHA512ad04d27a030d797795206b1ea54c79a3049a9c2c935a9db47bc7cbf25f7fabb332d03ea058455a67768ed7308d16baa85ccbb855cb0bc75253bf4fb2dd1306ca
-
C:\Users\Admin\AppData\Local\Temp\736D.exeMD5
43a0e04ea49d0bbba2a4385865147683
SHA14a04c008748bdd4b3472a5b068ef934353e5a8b7
SHA25618fabf656f45b9266522cccd48da832aa50ea4f5d753c060fdc8ccfd3df89906
SHA512ad04d27a030d797795206b1ea54c79a3049a9c2c935a9db47bc7cbf25f7fabb332d03ea058455a67768ed7308d16baa85ccbb855cb0bc75253bf4fb2dd1306ca
-
C:\Users\Admin\AppData\Local\Temp\736D.exeMD5
43a0e04ea49d0bbba2a4385865147683
SHA14a04c008748bdd4b3472a5b068ef934353e5a8b7
SHA25618fabf656f45b9266522cccd48da832aa50ea4f5d753c060fdc8ccfd3df89906
SHA512ad04d27a030d797795206b1ea54c79a3049a9c2c935a9db47bc7cbf25f7fabb332d03ea058455a67768ed7308d16baa85ccbb855cb0bc75253bf4fb2dd1306ca
-
C:\Users\Admin\AppData\Local\Temp\76217900942323299586MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\8AC5.exeMD5
cdeae1869dbb82030ac7983e55ac133c
SHA1b4806720c9b8c9f29dbae40a21f57c18f240165e
SHA256f6f327619023a7b3e37b5a9725fd0f7321a455a6aca1bb6d7db2bc4c05f18434
SHA512521fb3d4fdccc1cd1fb5605636ecdbc905ce9f7c4a83682f66a802abaf7ab1effac6b6c60499df6618a09d1814dbf7f3c271922c9064bf10515973ac0fb29efb
-
C:\Users\Admin\AppData\Local\Temp\8D93.exeMD5
b01767607a52909aec325b1a50853c3d
SHA187418f913d254ae822fb9a814b60db42e615cf60
SHA2562a250188ffe87fa64e93cccf3b197d89d6e5ab8ba8efea9a0149fc0a7f4d8fc3
SHA512f1e783ad7dcd22ff49401c1dd5b7a99da072214ac46dbd381bdaf8a902ad05c6fc2db83dcc4e31f221262b0f386c45b87a6128bf3e4378b0157be4d34847c27f
-
C:\Users\Admin\AppData\Local\Temp\9B2B.exeMD5
6ffc35a9573fdf8fb4bff5a8abdb3b18
SHA1259555c90b31ab9016ce679c4ca04fb20d29fe7d
SHA256fd41579accad8fb1aff5a718e1bb7b3fb315451bbd7e236d39435ecfaf6091ec
SHA5128cdecffed7bac6c92bd447d4144f9e100689843e8b5ff6a208a04cce006f70af1d9536ac5b67e467839e982ba760135034232067544b7dbf91674b39c96dbc3e
-
C:\Users\Admin\AppData\Local\Temp\9B2B.exeMD5
6ffc35a9573fdf8fb4bff5a8abdb3b18
SHA1259555c90b31ab9016ce679c4ca04fb20d29fe7d
SHA256fd41579accad8fb1aff5a718e1bb7b3fb315451bbd7e236d39435ecfaf6091ec
SHA5128cdecffed7bac6c92bd447d4144f9e100689843e8b5ff6a208a04cce006f70af1d9536ac5b67e467839e982ba760135034232067544b7dbf91674b39c96dbc3e
-
C:\Users\Admin\AppData\Local\Temp\9B2B.exeMD5
6ffc35a9573fdf8fb4bff5a8abdb3b18
SHA1259555c90b31ab9016ce679c4ca04fb20d29fe7d
SHA256fd41579accad8fb1aff5a718e1bb7b3fb315451bbd7e236d39435ecfaf6091ec
SHA5128cdecffed7bac6c92bd447d4144f9e100689843e8b5ff6a208a04cce006f70af1d9536ac5b67e467839e982ba760135034232067544b7dbf91674b39c96dbc3e
-
C:\Users\Admin\AppData\Local\Temp\9E86.exeMD5
f9ae40e56a7d66dc43ca706680236414
SHA13f5f3e075c1961a137f01bafaf23e4094c6a2ba8
SHA256315ee8c26c077867f336c7485bc67f73f50ea023e3ede4b8cabab612a71afcc2
SHA51208d5fe9afd281d73128df42f2378f8e74e320b730a5d41c700172a8533c1f44ac95f9502beb22fb748dcdb71d05b7020ed0f7bfff19e585054a9968869312bdf
-
C:\Users\Admin\AppData\Local\Temp\9E86.exeMD5
f9ae40e56a7d66dc43ca706680236414
SHA13f5f3e075c1961a137f01bafaf23e4094c6a2ba8
SHA256315ee8c26c077867f336c7485bc67f73f50ea023e3ede4b8cabab612a71afcc2
SHA51208d5fe9afd281d73128df42f2378f8e74e320b730a5d41c700172a8533c1f44ac95f9502beb22fb748dcdb71d05b7020ed0f7bfff19e585054a9968869312bdf
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bifurcation.exeMD5
e4f9cc74cc41b9534f82e6a9645ccb2e
SHA17b0d573dcd79d13a6b8e2db296aef2a4816180cc
SHA256609b78aa032cbfce2ebf74fbee9242327567dea566b11551bdee4fbef9d8aacc
SHA512a719986bc4f4e856c9080ad66b115c3113fa6acdbb222e968a509998e130c71603b44d019911856037e8fe4a043600ba472fb428627d71a8440630256c22d6fb
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bifurcation.exeMD5
e4f9cc74cc41b9534f82e6a9645ccb2e
SHA17b0d573dcd79d13a6b8e2db296aef2a4816180cc
SHA256609b78aa032cbfce2ebf74fbee9242327567dea566b11551bdee4fbef9d8aacc
SHA512a719986bc4f4e856c9080ad66b115c3113fa6acdbb222e968a509998e130c71603b44d019911856037e8fe4a043600ba472fb428627d71a8440630256c22d6fb
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\mannishly.batMD5
8c54b76d24ee177cdcd4635e3f573c14
SHA15bda977ad8ac49efc489353f7216214aed52453c
SHA256ec9f4742439f1b66b1cef6ddfd010f8c0399af60afae914aef4ea6918ffd1564
SHA512310b90b8552b99154f1cb10625b18f6873e88967f647b66a7b1477ab92042a92b42687f2800b074c2bdf9299bef284b602b57f0f943b6444286693e15c13c22e
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
C:\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
\Users\Admin\AppData\Local\Temp\2303a34fa8\tkools.exeMD5
a1fc3d75ce6e2aea0f64f38a42f5b44e
SHA1c349aa7b9ab75c82456be18f0af3e86cea800447
SHA2562c9967236c0868dd758aa061c32c2b91785f6be9cc7ee6ce0cfa4528dd4da45e
SHA512118563b67d551a87e6a370780fd3b4ab3f7b967ec9328a018e9085f1f9a0d10c890bf533d53fbd249da0275a9c141b0071a4f7096c75e95d30b4cb83975b85b6
-
\Users\Admin\AppData\Local\Temp\4C5C.exeMD5
f240a0240746af43de96ce02bc9fb5c8
SHA10e962e42bda9d9524a225c6f98e1da3539c4a627
SHA256a706b4a7c2d2a38b2a417f05c34fc5585fc89e31b9ce50438673832a40583967
SHA5120318e5baaf5996ab367ad722480b0c801e93ee1f9e00bc783c39ccddf6fe80b31fd5da25fa8dce2236a26be1be79f0320905b5261b6cd7d0f48de0fbe555fe6a
-
\Users\Admin\AppData\Local\Temp\736D.exeMD5
43a0e04ea49d0bbba2a4385865147683
SHA14a04c008748bdd4b3472a5b068ef934353e5a8b7
SHA25618fabf656f45b9266522cccd48da832aa50ea4f5d753c060fdc8ccfd3df89906
SHA512ad04d27a030d797795206b1ea54c79a3049a9c2c935a9db47bc7cbf25f7fabb332d03ea058455a67768ed7308d16baa85ccbb855cb0bc75253bf4fb2dd1306ca
-
\Users\Admin\AppData\Local\Temp\9B2B.exeMD5
6ffc35a9573fdf8fb4bff5a8abdb3b18
SHA1259555c90b31ab9016ce679c4ca04fb20d29fe7d
SHA256fd41579accad8fb1aff5a718e1bb7b3fb315451bbd7e236d39435ecfaf6091ec
SHA5128cdecffed7bac6c92bd447d4144f9e100689843e8b5ff6a208a04cce006f70af1d9536ac5b67e467839e982ba760135034232067544b7dbf91674b39c96dbc3e
-
\Users\Admin\AppData\Local\Temp\RarSFX0\bifurcation.exeMD5
e4f9cc74cc41b9534f82e6a9645ccb2e
SHA17b0d573dcd79d13a6b8e2db296aef2a4816180cc
SHA256609b78aa032cbfce2ebf74fbee9242327567dea566b11551bdee4fbef9d8aacc
SHA512a719986bc4f4e856c9080ad66b115c3113fa6acdbb222e968a509998e130c71603b44d019911856037e8fe4a043600ba472fb428627d71a8440630256c22d6fb
-
\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
\Users\Admin\AppData\Local\Temp\RarSFX1\beadroll.exeMD5
52e73c27fa7841f6fa35d8940e5d9083
SHA1c9c55d0970e8daa864355f195476f15faa9b229a
SHA256e1c41cd915b9630b0d30e10ae62b835c8495951301b0471d5b2fe7c541b35a05
SHA512be55e9611bb2a817c135495137f36c9946679278f17d41c4ba24419ff1a70d17b6fbfb1396492589e07e99f06d91509df472da98c0780de4d2d6a5efae33fe9c
-
memory/268-58-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/268-57-0x0000000000020000-0x0000000000028000-memory.dmpFilesize
32KB
-
memory/524-100-0x0000000000000000-mapping.dmp
-
memory/704-88-0x0000000000402DF8-mapping.dmp
-
memory/848-113-0x0000000000260000-0x0000000000698000-memory.dmpFilesize
4.2MB
-
memory/848-109-0x0000000000000000-mapping.dmp
-
memory/848-112-0x0000000000260000-0x0000000000698000-memory.dmpFilesize
4.2MB
-
memory/848-114-0x0000000000260000-0x0000000000698000-memory.dmpFilesize
4.2MB
-
memory/848-115-0x0000000000260000-0x0000000000698000-memory.dmpFilesize
4.2MB
-
memory/848-116-0x0000000000260000-0x0000000000698000-memory.dmpFilesize
4.2MB
-
memory/900-56-0x0000000075B11000-0x0000000075B13000-memory.dmpFilesize
8KB
-
memory/900-54-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/900-55-0x0000000000402DF8-mapping.dmp
-
memory/912-66-0x0000000000000000-mapping.dmp
-
memory/936-197-0x00000000002A0000-0x000000000032E000-memory.dmpFilesize
568KB
-
memory/936-176-0x0000000000000000-mapping.dmp
-
memory/936-196-0x0000000000220000-0x000000000026E000-memory.dmpFilesize
312KB
-
memory/936-198-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/964-106-0x0000000000000000-mapping.dmp
-
memory/980-103-0x0000000000000000-mapping.dmp
-
memory/1016-131-0x0000000000000000-mapping.dmp
-
memory/1016-161-0x00000000001E0000-0x0000000000210000-memory.dmpFilesize
192KB
-
memory/1016-153-0x00000000001B0000-0x00000000001D2000-memory.dmpFilesize
136KB
-
memory/1028-101-0x0000000000000000-mapping.dmp
-
memory/1092-148-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1092-162-0x00000000000A8D4A-mapping.dmp
-
memory/1092-165-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1092-164-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1092-175-0x00000000042B0000-0x00000000042B1000-memory.dmpFilesize
4KB
-
memory/1092-167-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/1108-62-0x0000000000000000-mapping.dmp
-
memory/1160-216-0x0000000000A80000-0x0000000000A81000-memory.dmpFilesize
4KB
-
memory/1160-123-0x0000000000AB0000-0x0000000001019000-memory.dmpFilesize
5.4MB
-
memory/1160-118-0x0000000000000000-mapping.dmp
-
memory/1208-70-0x0000000000000000-mapping.dmp
-
memory/1264-107-0x0000000000000000-mapping.dmp
-
memory/1268-59-0x0000000002B30000-0x0000000002B46000-memory.dmpFilesize
88KB
-
memory/1268-133-0x0000000002D50000-0x0000000002D66000-memory.dmpFilesize
88KB
-
memory/1268-179-0x0000000003B40000-0x0000000003B56000-memory.dmpFilesize
88KB
-
memory/1344-129-0x0000000000000000-mapping.dmp
-
memory/1440-108-0x0000000000000000-mapping.dmp
-
memory/1504-130-0x0000000000450000-0x0000000000475000-memory.dmpFilesize
148KB
-
memory/1504-77-0x0000000000000000-mapping.dmp
-
memory/1504-80-0x00000000009F0000-0x00000000009F1000-memory.dmpFilesize
4KB
-
memory/1504-86-0x0000000004B20000-0x0000000004B21000-memory.dmpFilesize
4KB
-
memory/1508-183-0x0000000000000000-mapping.dmp
-
memory/1508-186-0x00000000008D0000-0x00000000008D1000-memory.dmpFilesize
4KB
-
memory/1508-189-0x0000000000220000-0x0000000000223000-memory.dmpFilesize
12KB
-
memory/1508-199-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/1508-201-0x00000000003E0000-0x0000000000422000-memory.dmpFilesize
264KB
-
memory/1588-94-0x0000000001300000-0x0000000001869000-memory.dmpFilesize
5.4MB
-
memory/1588-91-0x0000000000000000-mapping.dmp
-
memory/1600-191-0x0000000000000000-mapping.dmp
-
memory/1600-194-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB
-
memory/1600-215-0x0000000004CE5000-0x0000000004CF6000-memory.dmpFilesize
68KB
-
memory/1600-200-0x0000000004CE0000-0x0000000004CE1000-memory.dmpFilesize
4KB
-
memory/1636-210-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-213-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/1636-208-0x000000000043714E-mapping.dmp
-
memory/1636-207-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-206-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-205-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-204-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-203-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1636-214-0x00000000049C0000-0x00000000049C1000-memory.dmpFilesize
4KB
-
memory/1696-102-0x0000000000000000-mapping.dmp
-
memory/1756-137-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-135-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-98-0x0000000000000000-mapping.dmp
-
memory/1756-174-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/1756-138-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-140-0x0000000000418D32-mapping.dmp
-
memory/1756-139-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-142-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1756-136-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/1760-99-0x0000000000000000-mapping.dmp
-
memory/1776-146-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/1776-121-0x0000000000000000-mapping.dmp
-
memory/1776-150-0x0000000000400000-0x0000000000437000-memory.dmpFilesize
220KB
-
memory/1776-143-0x0000000000020000-0x0000000000028000-memory.dmpFilesize
32KB
-
memory/1784-127-0x0000000000000000-mapping.dmp
-
memory/1840-60-0x0000000000000000-mapping.dmp
-
memory/1840-87-0x0000000000020000-0x0000000000028000-memory.dmpFilesize
32KB
-
memory/1964-128-0x0000000000000000-mapping.dmp
-
memory/1992-105-0x0000000000000000-mapping.dmp
-
memory/2028-169-0x0000000000000000-mapping.dmp
-
memory/2028-182-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/2028-181-0x0000000000280000-0x000000000030E000-memory.dmpFilesize
568KB
-
memory/2028-180-0x0000000000220000-0x000000000026E000-memory.dmpFilesize
312KB
-
memory/2032-163-0x00000000004A0000-0x00000000004BB000-memory.dmpFilesize
108KB
-
memory/2032-172-0x00000000047A3000-0x00000000047A4000-memory.dmpFilesize
4KB
-
memory/2032-171-0x00000000047A2000-0x00000000047A3000-memory.dmpFilesize
4KB
-
memory/2032-157-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB
-
memory/2032-173-0x00000000047A4000-0x00000000047A6000-memory.dmpFilesize
8KB
-
memory/2032-159-0x00000000047A1000-0x00000000047A2000-memory.dmpFilesize
4KB
-
memory/2032-152-0x000000000040CD2F-mapping.dmp
-
memory/2032-158-0x0000000000480000-0x000000000049C000-memory.dmpFilesize
112KB
-
memory/2032-149-0x0000000000400000-0x0000000000433000-memory.dmpFilesize
204KB