Analysis
-
max time kernel
152s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 07:01
Static task
static1
Behavioral task
behavioral1
Sample
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe
Resource
win10-en-20211014
General
-
Target
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe
-
Size
248KB
-
MD5
c36b297ba62298f6858b05558efa611c
-
SHA1
9cf689ee3dfa9e4e54c4f143459cce86fd26174f
-
SHA256
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef
-
SHA512
b371c021ce355a5f5b3f09edd103dda58af2f4019021bdb8ae94eca434afc250b9deb3c8063de40b1281d85fb2cb68ad6e35d294d045573182c78772ed87200c
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
arkei
Default
http://153.92.210.92/lYWcN6H7B1.php
Extracted
raccoon
1.8.3-hotfix
8b6023dd139bdc34aab99c286fae23d1442b4956
-
url4cnc
http://91.219.236.27/h_electricryptors2
http://5.181.156.92/h_electricryptors2
http://91.219.236.207/h_electricryptors2
http://185.225.19.18/h_electricryptors2
http://91.219.237.227/h_electricryptors2
https://t.me/h_electricryptors2
Extracted
raccoon
1.8.3-hotfix
049dc5184bb65eb56e4e860bf61427e2a0fcba1e
-
url4cnc
http://185.225.19.18/duglassa1
http://91.219.237.227/duglassa1
https://t.me/duglassa1
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/624-139-0x0000000000290000-0x0000000000405000-memory.dmp family_redline behavioral1/memory/424-167-0x0000000000F50000-0x00000000010B8000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1544-194-0x0000000001280000-0x000000000174A000-memory.dmp family_arkei behavioral1/memory/1544-191-0x0000000001280000-0x000000000174A000-memory.dmp family_arkei behavioral1/memory/1544-188-0x0000000001280000-0x000000000174A000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
3D05.exe93F0.exe96A0.exe9A89.exeA1CE.exe93F0.exeAA3B.exeAC5F.exeBC3E.exe96A0.exeD342.exeRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.compid process 780 3D05.exe 2888 93F0.exe 1080 96A0.exe 1688 9A89.exe 624 A1CE.exe 732 93F0.exe 1544 AA3B.exe 424 AC5F.exe 4072 BC3E.exe 3260 96A0.exe 2128 D342.exe 1680 Ritroverai.exe.com 1916 Ritroverai.exe.com 1416 Ritroverai.exe.com 3956 Ritroverai.exe.com 2092 Ritroverai.exe.com 3168 Ritroverai.exe.com -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
AA3B.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion AA3B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion AA3B.exe -
Deletes itself 1 IoCs
Processes:
pid process 2568 -
Loads dropped DLL 3 IoCs
Processes:
AA3B.exepid process 1544 AA3B.exe 1544 AA3B.exe 1544 AA3B.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
D342.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce D342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" D342.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
AA3B.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AA3B.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
AA3B.exeAC5F.exepid process 1544 AA3B.exe 424 AC5F.exe 1544 AA3B.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe93F0.exe96A0.exedescription pid process target process PID 2132 set thread context of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2888 set thread context of 732 2888 93F0.exe 93F0.exe PID 1080 set thread context of 3260 1080 96A0.exe 96A0.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
3D05.exe93F0.exeacb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D05.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D05.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3D05.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93F0.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93F0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 93F0.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
AA3B.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AA3B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString AA3B.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exepid process 640 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe 640 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 2568 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2568 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe3D05.exe93F0.exepid process 640 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe 780 3D05.exe 2568 2568 2568 2568 732 93F0.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
A1CE.exedescription pid process Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeDebugPrivilege 624 A1CE.exe Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 Token: SeCreatePagefilePrivilege 2568 Token: SeShutdownPrivilege 2568 -
Suspicious use of FindShellTrayWindow 42 IoCs
Processes:
Ritroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.compid process 1680 Ritroverai.exe.com 2568 2568 1680 Ritroverai.exe.com 1680 Ritroverai.exe.com 2568 2568 1916 Ritroverai.exe.com 2568 2568 1916 Ritroverai.exe.com 1916 Ritroverai.exe.com 2568 2568 1416 Ritroverai.exe.com 2568 2568 1416 Ritroverai.exe.com 1416 Ritroverai.exe.com 2568 2568 3956 Ritroverai.exe.com 2568 2568 3956 Ritroverai.exe.com 3956 Ritroverai.exe.com 2568 2568 2092 Ritroverai.exe.com 2568 2568 2092 Ritroverai.exe.com 2092 Ritroverai.exe.com 2568 2568 3168 Ritroverai.exe.com 2568 2568 3168 Ritroverai.exe.com 3168 Ritroverai.exe.com 2568 2568 -
Suspicious use of SendNotifyMessage 18 IoCs
Processes:
Ritroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.comRitroverai.exe.compid process 1680 Ritroverai.exe.com 1680 Ritroverai.exe.com 1680 Ritroverai.exe.com 1916 Ritroverai.exe.com 1916 Ritroverai.exe.com 1916 Ritroverai.exe.com 1416 Ritroverai.exe.com 1416 Ritroverai.exe.com 1416 Ritroverai.exe.com 3956 Ritroverai.exe.com 3956 Ritroverai.exe.com 3956 Ritroverai.exe.com 2092 Ritroverai.exe.com 2092 Ritroverai.exe.com 2092 Ritroverai.exe.com 3168 Ritroverai.exe.com 3168 Ritroverai.exe.com 3168 Ritroverai.exe.com -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe93F0.exe96A0.exeD342.execmd.exedescription pid process target process PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2132 wrote to memory of 640 2132 acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe PID 2568 wrote to memory of 780 2568 3D05.exe PID 2568 wrote to memory of 780 2568 3D05.exe PID 2568 wrote to memory of 780 2568 3D05.exe PID 2568 wrote to memory of 2888 2568 93F0.exe PID 2568 wrote to memory of 2888 2568 93F0.exe PID 2568 wrote to memory of 2888 2568 93F0.exe PID 2568 wrote to memory of 1080 2568 96A0.exe PID 2568 wrote to memory of 1080 2568 96A0.exe PID 2568 wrote to memory of 1080 2568 96A0.exe PID 2568 wrote to memory of 1688 2568 9A89.exe PID 2568 wrote to memory of 1688 2568 9A89.exe PID 2568 wrote to memory of 1688 2568 9A89.exe PID 2568 wrote to memory of 624 2568 A1CE.exe PID 2568 wrote to memory of 624 2568 A1CE.exe PID 2568 wrote to memory of 624 2568 A1CE.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2888 wrote to memory of 732 2888 93F0.exe 93F0.exe PID 2568 wrote to memory of 1544 2568 AA3B.exe PID 2568 wrote to memory of 1544 2568 AA3B.exe PID 2568 wrote to memory of 1544 2568 AA3B.exe PID 2568 wrote to memory of 424 2568 AC5F.exe PID 2568 wrote to memory of 424 2568 AC5F.exe PID 2568 wrote to memory of 424 2568 AC5F.exe PID 2568 wrote to memory of 2344 2568 explorer.exe PID 2568 wrote to memory of 2344 2568 explorer.exe PID 2568 wrote to memory of 2344 2568 explorer.exe PID 2568 wrote to memory of 2344 2568 explorer.exe PID 2568 wrote to memory of 2076 2568 explorer.exe PID 2568 wrote to memory of 2076 2568 explorer.exe PID 2568 wrote to memory of 2076 2568 explorer.exe PID 2568 wrote to memory of 4072 2568 BC3E.exe PID 2568 wrote to memory of 4072 2568 BC3E.exe PID 2568 wrote to memory of 4072 2568 BC3E.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 1080 wrote to memory of 3260 1080 96A0.exe 96A0.exe PID 2568 wrote to memory of 2128 2568 D342.exe PID 2568 wrote to memory of 2128 2568 D342.exe PID 2568 wrote to memory of 2128 2568 D342.exe PID 2128 wrote to memory of 2632 2128 D342.exe expand.exe PID 2128 wrote to memory of 2632 2128 D342.exe expand.exe PID 2128 wrote to memory of 2632 2128 D342.exe expand.exe PID 2128 wrote to memory of 1788 2128 D342.exe cmd.exe PID 2128 wrote to memory of 1788 2128 D342.exe cmd.exe PID 2128 wrote to memory of 1788 2128 D342.exe cmd.exe PID 892 wrote to memory of 2132 892 cmd.exe findstr.exe PID 892 wrote to memory of 2132 892 cmd.exe findstr.exe PID 892 wrote to memory of 2132 892 cmd.exe findstr.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe"C:\Users\Admin\AppData\Local\Temp\acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe"C:\Users\Admin\AppData\Local\Temp\acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3D05.exeC:\Users\Admin\AppData\Local\Temp\3D05.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\93F0.exeC:\Users\Admin\AppData\Local\Temp\93F0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\93F0.exeC:\Users\Admin\AppData\Local\Temp\93F0.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\96A0.exeC:\Users\Admin\AppData\Local\Temp\96A0.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\96A0.exeC:\Users\Admin\AppData\Local\Temp\96A0.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\9A89.exeC:\Users\Admin\AppData\Local\Temp\9A89.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\A1CE.exeC:\Users\Admin\AppData\Local\Temp\A1CE.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AA3B.exeC:\Users\Admin\AppData\Local\Temp\AA3B.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Users\Admin\AppData\Local\Temp\AC5F.exeC:\Users\Admin\AppData\Local\Temp\AC5F.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\BC3E.exeC:\Users\Admin\AppData\Local\Temp\BC3E.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\D342.exeC:\Users\Admin\AppData\Local\Temp\D342.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\expand.exeexpand2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Confronto.vsd2⤵
-
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^zsXALugVPsbikcLGmlTQMSJGkUUtRoHQkZmHLQyLLuVpnCdInRQPNWfBIsgQkprGKGWkWrUJtiyFXmiJDk$" Che.vsd4⤵
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comRitroverai.exe.com B4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.com B9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\SysWOW64\nslookup.exeC:\Windows\SysWOW64\nslookup.exe10⤵
-
C:\Windows\SysWOW64\PING.EXEping JQKTJDNJ4⤵
- Runs ping.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3D05.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\3D05.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\93F0.exeMD5
c36b297ba62298f6858b05558efa611c
SHA19cf689ee3dfa9e4e54c4f143459cce86fd26174f
SHA256acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef
SHA512b371c021ce355a5f5b3f09edd103dda58af2f4019021bdb8ae94eca434afc250b9deb3c8063de40b1281d85fb2cb68ad6e35d294d045573182c78772ed87200c
-
C:\Users\Admin\AppData\Local\Temp\93F0.exeMD5
c36b297ba62298f6858b05558efa611c
SHA19cf689ee3dfa9e4e54c4f143459cce86fd26174f
SHA256acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef
SHA512b371c021ce355a5f5b3f09edd103dda58af2f4019021bdb8ae94eca434afc250b9deb3c8063de40b1281d85fb2cb68ad6e35d294d045573182c78772ed87200c
-
C:\Users\Admin\AppData\Local\Temp\93F0.exeMD5
c36b297ba62298f6858b05558efa611c
SHA19cf689ee3dfa9e4e54c4f143459cce86fd26174f
SHA256acb9725387e858c64a98869c4027b284ac0cba006df8fa2a8f906848b56e88ef
SHA512b371c021ce355a5f5b3f09edd103dda58af2f4019021bdb8ae94eca434afc250b9deb3c8063de40b1281d85fb2cb68ad6e35d294d045573182c78772ed87200c
-
C:\Users\Admin\AppData\Local\Temp\96A0.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\96A0.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\96A0.exeMD5
61a3807e15231687f38358e3ae6b670c
SHA1b577ef08f60b55811aa5b8b93e5b3755b899115f
SHA25656283f214f84bf23a55813990e2147767f71a61c6158ed1e5e9178527a6f90f1
SHA5128dfe85f3779d08a083e6be58d8ea9638daa1fe03716e1a8a88ab9be90cd9fa03a6c05c8e7e6ab37a2d729fe422c8a280133ea4cc2820d140a71b6eb78231b9f4
-
C:\Users\Admin\AppData\Local\Temp\9A89.exeMD5
43ce3ca5ad13336bdf29fe85afb96df7
SHA1630879d33220cf2f51b0b5fe69ebc53b678982ec
SHA2563129a7ea52a2719d1ae7f5f0a3f6e9c8288d32bf147186e345941561c89af372
SHA5123e7a37972dda6517ec824b578b18082c06990dc2085ecb0fa90a177e69f13d4a2e123d6fc634f06604866b166741737b091b8ac7825338744bfe45e38e53af18
-
C:\Users\Admin\AppData\Local\Temp\9A89.exeMD5
43ce3ca5ad13336bdf29fe85afb96df7
SHA1630879d33220cf2f51b0b5fe69ebc53b678982ec
SHA2563129a7ea52a2719d1ae7f5f0a3f6e9c8288d32bf147186e345941561c89af372
SHA5123e7a37972dda6517ec824b578b18082c06990dc2085ecb0fa90a177e69f13d4a2e123d6fc634f06604866b166741737b091b8ac7825338744bfe45e38e53af18
-
C:\Users\Admin\AppData\Local\Temp\A1CE.exeMD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
C:\Users\Admin\AppData\Local\Temp\A1CE.exeMD5
4df0d4be3b3abb5ca237d11013411885
SHA17b9376e633769eb52a70ec887143826f924f6fee
SHA2562cf6a392704eb1ede9545577028283a714d4abd1b53318ca11b3075dee799813
SHA51214e1543c4f8a5c331ef1de493c7aaf8e2ade61b6a4cc9e15e2e3ce988be4cd5c72a2558c78e39ebe8f71de592945192df7cb2093ce71d62d5a417f5cf6858db7
-
C:\Users\Admin\AppData\Local\Temp\AA3B.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\AA3B.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\AC5F.exeMD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
C:\Users\Admin\AppData\Local\Temp\AC5F.exeMD5
4d96f213bfbba34ffba4986724d3a99c
SHA1b7dfe9e3a186bf0d0a0e3793c84cd83d23b4c526
SHA256f901c29eb448ec4288c6215ba6af0ce804009b69e6505ab35f1037f23851f5b7
SHA5124e333f8fd1fca9784deb59c12645be1b68e12771dbc77f48419365df7da46638b40bb0a00f0640225a1ee652096c0f3cf7ebd12ed3463afb24f7df27c3717937
-
C:\Users\Admin\AppData\Local\Temp\BC3E.exeMD5
2e19613dc4b7b13c47312bfdf4ec399c
SHA16809a37a40a224029f07c62c6308121e5d84290d
SHA256ed7edd291d4c2cc21f2c75af41f1d32b2e6ae6973236d1715d83f01c76811021
SHA512b939889905b7c28b217946b2185da12098ac45d0d6fe602253644d2d30f9d6c8db753c84df5cd6548c2a3b390b1c69915735240864ea0e722bfeaec05aeb620a
-
C:\Users\Admin\AppData\Local\Temp\BC3E.exeMD5
2e19613dc4b7b13c47312bfdf4ec399c
SHA16809a37a40a224029f07c62c6308121e5d84290d
SHA256ed7edd291d4c2cc21f2c75af41f1d32b2e6ae6973236d1715d83f01c76811021
SHA512b939889905b7c28b217946b2185da12098ac45d0d6fe602253644d2d30f9d6c8db753c84df5cd6548c2a3b390b1c69915735240864ea0e722bfeaec05aeb620a
-
C:\Users\Admin\AppData\Local\Temp\D342.exeMD5
a9bc4aeb94664b8938a00b5301225d7a
SHA19a0ecb70fc029faeb968de0e639537d6baf525e4
SHA25694e99f4dbbf9739b71ee8dad26651b8cd01cd3c5bb6eb97da26d88991351cf6b
SHA5123382be368a3d4fc9cf3016dc2bcfc0eb6bf3345ba644441b2e1d8b4f37831216681b5c18e8692c3ea96f1b12df52255dffcc2ab85e5068609cc573b0ff98988c
-
C:\Users\Admin\AppData\Local\Temp\D342.exeMD5
a9bc4aeb94664b8938a00b5301225d7a
SHA19a0ecb70fc029faeb968de0e639537d6baf525e4
SHA25694e99f4dbbf9739b71ee8dad26651b8cd01cd3c5bb6eb97da26d88991351cf6b
SHA5123382be368a3d4fc9cf3016dc2bcfc0eb6bf3345ba644441b2e1d8b4f37831216681b5c18e8692c3ea96f1b12df52255dffcc2ab85e5068609cc573b0ff98988c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BMD5
9c8b1ff7225c8a2a275da1429a4def68
SHA1327b06f14e19ea05ea4098a876e791957ab5564e
SHA256d8cae76147cc93bd2bbbd286e773e9bff830ed53982c13634ac2aea102d39e48
SHA51264e7549f98674882724a190057bc2e34c77ff89b137ae33d98c26944507179d60d9d784e4240e4e89d1dfc5ddfe10a7c6b3c687551f6671caebb36c45b12e165
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Che.vsdMD5
b244d053acb999b59be3eba3e2d082d5
SHA10cf0b6dce77473217b49e6728d93433ccbcefe4e
SHA256c9348064a4b8f7fdc331e7953153a6fa57b2d5763638a79116e0d3704c671f69
SHA512f4f44e5fa2fe3b1d6999bde94a39c5acb430a1cac4549eb1f57218437e4252ea077ab5797fdd73ad7a8b0e162aa41b0a07cf82feb31821ab35d425e09365101b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Istante.vsdMD5
9c8b1ff7225c8a2a275da1429a4def68
SHA1327b06f14e19ea05ea4098a876e791957ab5564e
SHA256d8cae76147cc93bd2bbbd286e773e9bff830ed53982c13634ac2aea102d39e48
SHA51264e7549f98674882724a190057bc2e34c77ff89b137ae33d98c26944507179d60d9d784e4240e4e89d1dfc5ddfe10a7c6b3c687551f6671caebb36c45b12e165
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ritroverai.exe.comMD5
c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/424-234-0x0000000006640000-0x0000000006641000-memory.dmpFilesize
4KB
-
memory/424-196-0x0000000075720000-0x0000000076A68000-memory.dmpFilesize
19.3MB
-
memory/424-171-0x0000000000F40000-0x0000000000F41000-memory.dmpFilesize
4KB
-
memory/424-201-0x000000006D530000-0x000000006D57B000-memory.dmpFilesize
300KB
-
memory/424-195-0x0000000074680000-0x0000000074C04000-memory.dmpFilesize
5.5MB
-
memory/424-189-0x0000000001790000-0x0000000001791000-memory.dmpFilesize
4KB
-
memory/424-238-0x0000000006760000-0x0000000006761000-memory.dmpFilesize
4KB
-
memory/424-181-0x0000000073CB0000-0x0000000073D30000-memory.dmpFilesize
512KB
-
memory/424-174-0x0000000001640000-0x0000000001687000-memory.dmpFilesize
284KB
-
memory/424-177-0x00000000011D0000-0x00000000011D1000-memory.dmpFilesize
4KB
-
memory/424-179-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/424-160-0x0000000000000000-mapping.dmp
-
memory/424-178-0x0000000074580000-0x0000000074671000-memory.dmpFilesize
964KB
-
memory/424-242-0x0000000006740000-0x0000000006741000-memory.dmpFilesize
4KB
-
memory/424-167-0x0000000000F50000-0x00000000010B8000-memory.dmpFilesize
1.4MB
-
memory/424-175-0x0000000074DC0000-0x0000000074F82000-memory.dmpFilesize
1.8MB
-
memory/624-233-0x0000000005FF0000-0x0000000005FF1000-memory.dmpFilesize
4KB
-
memory/624-148-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/624-140-0x00000000007F0000-0x00000000007F1000-memory.dmpFilesize
4KB
-
memory/624-141-0x0000000000C90000-0x0000000000CD3000-memory.dmpFilesize
268KB
-
memory/624-163-0x0000000074680000-0x0000000074C04000-memory.dmpFilesize
5.5MB
-
memory/624-152-0x00000000025C0000-0x00000000025C1000-memory.dmpFilesize
4KB
-
memory/624-165-0x0000000004EC0000-0x0000000004EC1000-memory.dmpFilesize
4KB
-
memory/624-258-0x0000000006AC0000-0x0000000006AC1000-memory.dmpFilesize
4KB
-
memory/624-146-0x0000000074580000-0x0000000074671000-memory.dmpFilesize
964KB
-
memory/624-136-0x0000000000000000-mapping.dmp
-
memory/624-170-0x0000000075720000-0x0000000076A68000-memory.dmpFilesize
19.3MB
-
memory/624-153-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/624-262-0x00000000069B0000-0x00000000069B1000-memory.dmpFilesize
4KB
-
memory/624-139-0x0000000000290000-0x0000000000405000-memory.dmpFilesize
1.5MB
-
memory/624-155-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/624-259-0x00000000071C0000-0x00000000071C1000-memory.dmpFilesize
4KB
-
memory/624-143-0x0000000074DC0000-0x0000000074F82000-memory.dmpFilesize
1.8MB
-
memory/624-247-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/624-150-0x0000000073CB0000-0x0000000073D30000-memory.dmpFilesize
512KB
-
memory/624-198-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/624-154-0x0000000004FE0000-0x0000000004FE1000-memory.dmpFilesize
4KB
-
memory/624-151-0x00000000054E0000-0x00000000054E1000-memory.dmpFilesize
4KB
-
memory/624-200-0x000000006D530000-0x000000006D57B000-memory.dmpFilesize
300KB
-
memory/640-117-0x0000000000402F47-mapping.dmp
-
memory/640-116-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/732-145-0x0000000000402F47-mapping.dmp
-
memory/780-124-0x0000000002BD0000-0x0000000002BD9000-memory.dmpFilesize
36KB
-
memory/780-123-0x0000000002BC0000-0x0000000002BC9000-memory.dmpFilesize
36KB
-
memory/780-120-0x0000000000000000-mapping.dmp
-
memory/780-125-0x0000000000400000-0x0000000002B64000-memory.dmpFilesize
39.4MB
-
memory/1080-213-0x0000000000740000-0x00000000007CF000-memory.dmpFilesize
572KB
-
memory/1080-210-0x0000000000651000-0x00000000006B7000-memory.dmpFilesize
408KB
-
memory/1080-130-0x0000000000000000-mapping.dmp
-
memory/1416-251-0x0000000000000000-mapping.dmp
-
memory/1544-191-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-166-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-156-0x0000000000000000-mapping.dmp
-
memory/1544-161-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-159-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-168-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-172-0x0000000000120000-0x0000000000121000-memory.dmpFilesize
4KB
-
memory/1544-176-0x0000000074DC0000-0x0000000074F82000-memory.dmpFilesize
1.8MB
-
memory/1544-173-0x0000000000F20000-0x0000000000F65000-memory.dmpFilesize
276KB
-
memory/1544-186-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-187-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-190-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-192-0x0000000077600000-0x000000007778E000-memory.dmpFilesize
1.6MB
-
memory/1544-194-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-169-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1544-188-0x0000000001280000-0x000000000174A000-memory.dmpFilesize
4.8MB
-
memory/1680-230-0x0000000000000000-mapping.dmp
-
memory/1688-217-0x0000000000400000-0x000000000050F000-memory.dmpFilesize
1.1MB
-
memory/1688-133-0x0000000000000000-mapping.dmp
-
memory/1688-212-0x00000000006D1000-0x0000000000720000-memory.dmpFilesize
316KB
-
memory/1688-214-0x00000000007C0000-0x000000000084F000-memory.dmpFilesize
572KB
-
memory/1788-224-0x0000000000000000-mapping.dmp
-
memory/1916-244-0x0000000000000000-mapping.dmp
-
memory/2076-206-0x0000000000790000-0x000000000079C000-memory.dmpFilesize
48KB
-
memory/2076-197-0x0000000000000000-mapping.dmp
-
memory/2076-203-0x00000000007A0000-0x00000000007A7000-memory.dmpFilesize
28KB
-
memory/2092-260-0x0000000000000000-mapping.dmp
-
memory/2128-219-0x0000000000000000-mapping.dmp
-
memory/2132-115-0x0000000000699000-0x00000000006A2000-memory.dmpFilesize
36KB
-
memory/2132-118-0x0000000002160000-0x0000000002169000-memory.dmpFilesize
36KB
-
memory/2132-227-0x0000000000000000-mapping.dmp
-
memory/2344-209-0x0000000003200000-0x0000000003274000-memory.dmpFilesize
464KB
-
memory/2344-184-0x0000000000000000-mapping.dmp
-
memory/2344-205-0x0000000002F90000-0x0000000002FFB000-memory.dmpFilesize
428KB
-
memory/2568-119-0x0000000001140000-0x0000000001156000-memory.dmpFilesize
88KB
-
memory/2568-126-0x0000000002B10000-0x0000000002B26000-memory.dmpFilesize
88KB
-
memory/2568-202-0x0000000003380000-0x0000000003396000-memory.dmpFilesize
88KB
-
memory/2632-222-0x0000000000000000-mapping.dmp
-
memory/2888-142-0x0000000000709000-0x0000000000712000-memory.dmpFilesize
36KB
-
memory/2888-127-0x0000000000000000-mapping.dmp
-
memory/3052-241-0x0000000000000000-mapping.dmp
-
memory/3168-265-0x0000000000000000-mapping.dmp
-
memory/3260-250-0x00000000033A0000-0x00000000034EA000-memory.dmpFilesize
1.3MB
-
memory/3260-255-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/3260-211-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/3260-249-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/3260-218-0x0000000000400000-0x0000000003269000-memory.dmpFilesize
46.4MB
-
memory/3260-246-0x000000000353C000-0x000000000358B000-memory.dmpFilesize
316KB
-
memory/3260-215-0x0000000000456A80-mapping.dmp
-
memory/3956-256-0x0000000000000000-mapping.dmp
-
memory/4072-204-0x0000000000000000-mapping.dmp
-
memory/4072-226-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/4072-225-0x00000000021C0000-0x000000000224F000-memory.dmpFilesize
572KB