Analysis
-
max time kernel
151s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
04-12-2021 08:32
Static task
static1
Behavioral task
behavioral1
Sample
5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe
Resource
win10-en-20211014
General
-
Target
5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe
-
Size
249KB
-
MD5
d972c5f193521f41d87746db1bd97615
-
SHA1
7c87ee88fefb4428e43f214080cdd21407cbe86d
-
SHA256
5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637
-
SHA512
e63464f1fb154e2f84b1c9909def6165dd45151969bf31d24afbe184eaf2aa5fd9c7454a38c5d654d9256c0239f23fd001c7a0b4ce59085a573a1145ced9b71f
Malware Config
Extracted
smokeloader
2020
http://rcacademy.at/upload/
http://e-lanpengeonline.com/upload/
http://vjcmvz.cn/upload/
http://galala.ru/upload/
http://witra.ru/upload/
https://cinems.club/search.php
https://clothes.surf/search.php
Extracted
redline
1
45.9.20.59:46287
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1500-149-0x0000000002090000-0x00000000020BE000-memory.dmp family_redline behavioral1/memory/1500-153-0x00000000024A0000-0x00000000024CC000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows dir Microsoft Windows DOS prompt command exit OUTBOUND
-
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
suricata: ET MALWARE Windows route Microsoft Windows DOS prompt command exit OUTBOUND
-
Downloads MZ/PE file
-
Executes dropped EXE 5 IoCs
Processes:
3E6C.exeSmartClock.exe67BF.exeA9DA.exeBCC7.exepid process 4332 3E6C.exe 4564 SmartClock.exe 908 67BF.exe 1152 A9DA.exe 1500 BCC7.exe -
Modifies Windows Firewall 1 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 2776 -
Drops startup file 1 IoCs
Processes:
3E6C.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 3E6C.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3212 3752 WerFault.exe DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
67BF.exe5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 67BF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 67BF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 67BF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
A9DA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString A9DA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 A9DA.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2836 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 4 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exeNETSTAT.EXENETSTAT.EXEipconfig.exepid process 5076 ipconfig.exe 2392 NETSTAT.EXE 896 NETSTAT.EXE 4184 ipconfig.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Processes:
IEXPLORE.EXEiexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\Main Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BC78B8D-2ED9-11EC-B8A2-F2F93CA9AA84} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
SmartClock.exepid process 4564 SmartClock.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exepid process 4216 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe 4216 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 2776 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2776 -
Suspicious behavior: MapViewOfSection 52 IoCs
Processes:
5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe67BF.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 4216 5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe 908 67BF.exe 2776 2776 2776 2776 2776 2776 60 explorer.exe 60 explorer.exe 2776 2776 352 explorer.exe 352 explorer.exe 2776 2776 336 explorer.exe 336 explorer.exe 2776 2776 4812 explorer.exe 4812 explorer.exe 2776 2776 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 4804 explorer.exe 2776 2776 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe 1176 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
BCC7.exeWMIC.exeWMIC.exedescription pid process Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeShutdownPrivilege 2776 Token: SeCreatePagefilePrivilege 2776 Token: SeDebugPrivilege 1500 BCC7.exe Token: SeIncreaseQuotaPrivilege 3940 WMIC.exe Token: SeSecurityPrivilege 3940 WMIC.exe Token: SeTakeOwnershipPrivilege 3940 WMIC.exe Token: SeLoadDriverPrivilege 3940 WMIC.exe Token: SeSystemProfilePrivilege 3940 WMIC.exe Token: SeSystemtimePrivilege 3940 WMIC.exe Token: SeProfSingleProcessPrivilege 3940 WMIC.exe Token: SeIncBasePriorityPrivilege 3940 WMIC.exe Token: SeCreatePagefilePrivilege 3940 WMIC.exe Token: SeBackupPrivilege 3940 WMIC.exe Token: SeRestorePrivilege 3940 WMIC.exe Token: SeShutdownPrivilege 3940 WMIC.exe Token: SeDebugPrivilege 3940 WMIC.exe Token: SeSystemEnvironmentPrivilege 3940 WMIC.exe Token: SeRemoteShutdownPrivilege 3940 WMIC.exe Token: SeUndockPrivilege 3940 WMIC.exe Token: SeManageVolumePrivilege 3940 WMIC.exe Token: 33 3940 WMIC.exe Token: 34 3940 WMIC.exe Token: 35 3940 WMIC.exe Token: 36 3940 WMIC.exe Token: SeIncreaseQuotaPrivilege 3940 WMIC.exe Token: SeSecurityPrivilege 3940 WMIC.exe Token: SeTakeOwnershipPrivilege 3940 WMIC.exe Token: SeLoadDriverPrivilege 3940 WMIC.exe Token: SeSystemProfilePrivilege 3940 WMIC.exe Token: SeSystemtimePrivilege 3940 WMIC.exe Token: SeProfSingleProcessPrivilege 3940 WMIC.exe Token: SeIncBasePriorityPrivilege 3940 WMIC.exe Token: SeCreatePagefilePrivilege 3940 WMIC.exe Token: SeBackupPrivilege 3940 WMIC.exe Token: SeRestorePrivilege 3940 WMIC.exe Token: SeShutdownPrivilege 3940 WMIC.exe Token: SeDebugPrivilege 3940 WMIC.exe Token: SeSystemEnvironmentPrivilege 3940 WMIC.exe Token: SeRemoteShutdownPrivilege 3940 WMIC.exe Token: SeUndockPrivilege 3940 WMIC.exe Token: SeManageVolumePrivilege 3940 WMIC.exe Token: 33 3940 WMIC.exe Token: 34 3940 WMIC.exe Token: 35 3940 WMIC.exe Token: 36 3940 WMIC.exe Token: SeIncreaseQuotaPrivilege 4256 WMIC.exe Token: SeSecurityPrivilege 4256 WMIC.exe Token: SeTakeOwnershipPrivilege 4256 WMIC.exe Token: SeLoadDriverPrivilege 4256 WMIC.exe Token: SeSystemProfilePrivilege 4256 WMIC.exe Token: SeSystemtimePrivilege 4256 WMIC.exe Token: SeProfSingleProcessPrivilege 4256 WMIC.exe Token: SeIncBasePriorityPrivilege 4256 WMIC.exe Token: SeCreatePagefilePrivilege 4256 WMIC.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1392 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1392 iexplore.exe 1392 iexplore.exe 4292 IEXPLORE.EXE 4292 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3E6C.execmd.exeA9DA.execmd.exenet.exedescription pid process target process PID 2776 wrote to memory of 4332 2776 3E6C.exe PID 2776 wrote to memory of 4332 2776 3E6C.exe PID 2776 wrote to memory of 4332 2776 3E6C.exe PID 4332 wrote to memory of 4564 4332 3E6C.exe SmartClock.exe PID 4332 wrote to memory of 4564 4332 3E6C.exe SmartClock.exe PID 4332 wrote to memory of 4564 4332 3E6C.exe SmartClock.exe PID 2776 wrote to memory of 908 2776 67BF.exe PID 2776 wrote to memory of 908 2776 67BF.exe PID 2776 wrote to memory of 908 2776 67BF.exe PID 2776 wrote to memory of 1152 2776 A9DA.exe PID 2776 wrote to memory of 1152 2776 A9DA.exe PID 2776 wrote to memory of 1152 2776 A9DA.exe PID 2776 wrote to memory of 1500 2776 BCC7.exe PID 2776 wrote to memory of 1500 2776 BCC7.exe PID 2776 wrote to memory of 1500 2776 BCC7.exe PID 2776 wrote to memory of 2820 2776 cmd.exe PID 2776 wrote to memory of 2820 2776 cmd.exe PID 2820 wrote to memory of 3940 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 3940 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4256 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4256 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4236 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4236 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4836 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4836 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4940 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4940 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1432 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1432 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 5100 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 5100 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 668 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 668 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1188 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1188 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4104 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 4104 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1332 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1332 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1548 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 1548 2820 cmd.exe WMIC.exe PID 1152 wrote to memory of 1756 1152 A9DA.exe cmd.exe PID 1152 wrote to memory of 1756 1152 A9DA.exe cmd.exe PID 1152 wrote to memory of 1756 1152 A9DA.exe cmd.exe PID 2820 wrote to memory of 2132 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 2132 2820 cmd.exe WMIC.exe PID 1756 wrote to memory of 2836 1756 cmd.exe timeout.exe PID 1756 wrote to memory of 2836 1756 cmd.exe timeout.exe PID 1756 wrote to memory of 2836 1756 cmd.exe timeout.exe PID 2820 wrote to memory of 2716 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 2716 2820 cmd.exe WMIC.exe PID 2820 wrote to memory of 5076 2820 cmd.exe ipconfig.exe PID 2820 wrote to memory of 5076 2820 cmd.exe ipconfig.exe PID 2820 wrote to memory of 3200 2820 cmd.exe ROUTE.EXE PID 2820 wrote to memory of 3200 2820 cmd.exe ROUTE.EXE PID 2820 wrote to memory of 3636 2820 cmd.exe netsh.exe PID 2820 wrote to memory of 3636 2820 cmd.exe netsh.exe PID 2820 wrote to memory of 3616 2820 cmd.exe systeminfo.exe PID 2820 wrote to memory of 3616 2820 cmd.exe systeminfo.exe PID 2820 wrote to memory of 3932 2820 cmd.exe tasklist.exe PID 2820 wrote to memory of 3932 2820 cmd.exe tasklist.exe PID 2820 wrote to memory of 496 2820 cmd.exe net.exe PID 2820 wrote to memory of 496 2820 cmd.exe net.exe PID 496 wrote to memory of 756 496 net.exe net1.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3752 -s 9162⤵
- Program crash
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\sihost.exesihost.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe"C:\Users\Admin\AppData\Local\Temp\5f09bed073ee293a061a528f489f905da90f9f206ab015bca3d36f6ea4a28637.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3E6C.exeC:\Users\Admin\AppData\Local\Temp\3E6C.exe1⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppXy7vb4pc2dr3kc93kfc509b1d0arkfb2x.mca1⤵
-
C:\Users\Admin\AppData\Local\Temp\67BF.exeC:\Users\Admin\AppData\Local\Temp\67BF.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\A9DA.exeC:\Users\Admin\AppData\Local\Temp\A9DA.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\A9DA.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\BCC7.exeC:\Users\Admin\AppData\Local\Temp\BCC7.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path FirewallProduct Get displayName /format:csv2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\SecurityCenter2 Path AntiSpywareProduct Get displayName /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Processor Get Name,DeviceID,NumberOfCores /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Product Get Name,Version /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_NetworkAdapter Where PhysicalAdapter=TRUE Get Name,MACAddress,ProductName,ServiceName,NetConnectionID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_StartupCommand Get Name,Location,Command /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_OperatingSystem Get Caption,CSDVersion,BuildNumber,Version,BuildType,CountryCode,CurrentTimeZone,InstallDate,LastBootUpTime,Locale,OSArchitecture,OSLanguage,OSProductSuite,OSType,SystemDirectory,Organization,RegisteredUser,SerialNumber /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Process Get Caption,CommandLine,ExecutablePath,ProcessId /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_Volume Get Name,Label,FileSystem,SerialNumber,BootVolume,Capacity,DriveType /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_UserAccount Get Name,Domain,AccountType,LocalAccount,Disabled,Status,SID /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_GroupUser Get GroupComponent,PartComponent /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_ComputerSystem Get Caption,Manufacturer,PrimaryOwnerName,UserName,Workgroup /format:csv2⤵
-
C:\Windows\System32\Wbem\WMIC.exewmic /namespace:\\root\cimv2 Path Win32_PnPEntity Where ClassGuid="{50dd5230-ba8a-11d1-bf5d-0000f805f530}" Get Name,DeviceID,PNPDeviceID,Manufacturer,Description /format:csv2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /displaydns2⤵
- Gathers network information
-
C:\Windows\system32\ROUTE.EXEroute print2⤵
-
C:\Windows\system32\netsh.exenetsh firewall show state2⤵
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
-
C:\Windows\system32\tasklist.exetasklist /v2⤵
- Enumerates processes with tasklist
-
C:\Windows\system32\net.exenet accounts /domain2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 accounts /domain3⤵
-
C:\Windows\system32\net.exenet share2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 share3⤵
-
C:\Windows\system32\net.exenet user2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user3⤵
-
C:\Windows\system32\net.exenet user /domain2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /domain3⤵
-
C:\Windows\system32\net.exenet use2⤵
-
C:\Windows\system32\net.exenet group2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 group3⤵
-
C:\Windows\system32\net.exenet localgroup2⤵
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup3⤵
-
C:\Windows\system32\NETSTAT.EXEnetstat -r2⤵
- Gathers network information
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Windows\system32\route.exe" print3⤵
-
C:\Windows\system32\ROUTE.EXEC:\Windows\system32\route.exe print4⤵
-
C:\Windows\system32\NETSTAT.EXEnetstat -nao2⤵
- Gathers network information
-
C:\Windows\system32\schtasks.exeschtasks /query2⤵
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1392 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
- Suspicious behavior: MapViewOfSection
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3E6C.exeMD5
f821b460a6ed4036911ba2eb5cf26f2c
SHA16330a75c3220b7789a2fc653c434c784c90ab5c1
SHA25673e4172aa509c32ea9e83a4814150d614f5dd1bc14c2d56fc3dd79d72b573e4d
SHA5129f5e0a6a129ed2e25cf3f04de3c508fcd38cd50bce2de0102cce315efb2b9d647150da2654393f64418845f7d0d706a66f5575ea652b9cc7f5c6cb79ac2c44d6
-
C:\Users\Admin\AppData\Local\Temp\3E6C.exeMD5
f821b460a6ed4036911ba2eb5cf26f2c
SHA16330a75c3220b7789a2fc653c434c784c90ab5c1
SHA25673e4172aa509c32ea9e83a4814150d614f5dd1bc14c2d56fc3dd79d72b573e4d
SHA5129f5e0a6a129ed2e25cf3f04de3c508fcd38cd50bce2de0102cce315efb2b9d647150da2654393f64418845f7d0d706a66f5575ea652b9cc7f5c6cb79ac2c44d6
-
C:\Users\Admin\AppData\Local\Temp\67BF.exeMD5
3e62a49676688db916609987456d5bf3
SHA1f71a158b6b22eeebf3c6029df21abf80abcc466f
SHA256e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2
SHA5128f0311be4605e468e5e0bc9400e6b1e1cc1d38f1febfc1679d7fac6ad857352f9ebc248e31c7335dbd1a57500da14f641ef49c7003a28cc1d32b6fe11c65cdb3
-
C:\Users\Admin\AppData\Local\Temp\67BF.exeMD5
3e62a49676688db916609987456d5bf3
SHA1f71a158b6b22eeebf3c6029df21abf80abcc466f
SHA256e57fee733b088752760a505c620455077eb4beeca27789c9213e5305d4587bc2
SHA5128f0311be4605e468e5e0bc9400e6b1e1cc1d38f1febfc1679d7fac6ad857352f9ebc248e31c7335dbd1a57500da14f641ef49c7003a28cc1d32b6fe11c65cdb3
-
C:\Users\Admin\AppData\Local\Temp\A9DA.exeMD5
bf605611fcf743f8682b1fe32eddc07a
SHA11f76600fcf3a4b8d10487c847eb9a85a8f628bb5
SHA2564a0da2fd65805e1661993c300650058fa41bfa78c3e235b4b0aa620d3d148956
SHA51289a8adf70f7e3f30fa1568d617768cc8a0802a39ddcc159c0ecd3a18cd577d864fce708dd9a1e4718ab6be520bf3005680f8ed12b712507afa28880532b631b9
-
C:\Users\Admin\AppData\Local\Temp\A9DA.exeMD5
bf605611fcf743f8682b1fe32eddc07a
SHA11f76600fcf3a4b8d10487c847eb9a85a8f628bb5
SHA2564a0da2fd65805e1661993c300650058fa41bfa78c3e235b4b0aa620d3d148956
SHA51289a8adf70f7e3f30fa1568d617768cc8a0802a39ddcc159c0ecd3a18cd577d864fce708dd9a1e4718ab6be520bf3005680f8ed12b712507afa28880532b631b9
-
C:\Users\Admin\AppData\Local\Temp\BCC7.exeMD5
38fc74ac5852aa8b03597ec1a09212e3
SHA14341b82ed16254c59905533c8861860484df1c47
SHA2563d5ed08a613ebc57e933570530e053b04f9a6307d0cf64e11b219c0c2f2e8f3b
SHA5126f862b4bffeb7c6609eae3a2a60aca7acc20c0c6d3cdece745f477050658a86b5c87535f2bbf297b049e7856883c81a9aa23901e548348dee852ad9faffd3d9f
-
C:\Users\Admin\AppData\Local\Temp\BCC7.exeMD5
38fc74ac5852aa8b03597ec1a09212e3
SHA14341b82ed16254c59905533c8861860484df1c47
SHA2563d5ed08a613ebc57e933570530e053b04f9a6307d0cf64e11b219c0c2f2e8f3b
SHA5126f862b4bffeb7c6609eae3a2a60aca7acc20c0c6d3cdece745f477050658a86b5c87535f2bbf297b049e7856883c81a9aa23901e548348dee852ad9faffd3d9f
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\NDHJFG~1.ZIPMD5
7ecc97e8c6a47506950ad47a53252bd4
SHA1f1a9f6c4539ddc098d3acb0d7bc30c7aabdfed14
SHA256ecae5f571bfeac2a47e815136c8dec796d18266ec6fc496f3b31db19f8dbdcd0
SHA512f1a6f4e71e22b14ee3c504f058323506725a3b3281f028205c479c77885632323338957ef394d346206e0bc48964227450d380ffb67c85b895fac26e43d6ddfa
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\YGGPST~1.ZIPMD5
4e259753557a3a66b20e2b9d0ec46474
SHA10e2816662a2d35dc600b1d9af4508f1239e65442
SHA256cff0f6a3448cdaf6b780e2f335506d20b681792c4ce791c962734bb99d1a57eb
SHA51211c96b6c7d3b6040eea75135e8ce8f22d4c91f6c3a44903ac3e060b4383ecfc2110cb7debee4549e928653101dab29648b886dc884ea48aa037a825b57f4b3d3
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_Chrome\DEFAUL~1.BINMD5
d4026455697acb78d4f621b54352b4f0
SHA1f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9
SHA2562e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624
SHA512efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_INFOR~1.TXTMD5
85589e308ad2fe1f33606dafc059586a
SHA1d4cfa910dafec111a367776abd3cfc2bdcc2fe6e
SHA25613dd6270cd997470162a05137a638a6a314f128385e6b7c97b4d5055c366a89a
SHA5126ac15259ab1c076d1474dbeda0e9edf2b39ac5d2e25ba4d01661ed4809ace166a51eb351059febba0770803f62c992253680eb6eaad49933a849b462c2e51ccb
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\_Files\_SCREE~1.JPEMD5
aee27496463bad18a2b0eb17252c9e50
SHA16e15124edaccfacf655b5e6383b8300c41abf8ff
SHA256735b988b035d6f7ec33f7f548d41729056c7044490ca1845ca59895dad7866d4
SHA512bb11ecd5f6a03c27c5966aa51630643c44a23152df378f5cf3aa0ab0d4778265720e2c21f49df22329773fa2877567eed967aebe9dd067e6d6bda9bd676e3383
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\SCREEN~1.JPGMD5
aee27496463bad18a2b0eb17252c9e50
SHA16e15124edaccfacf655b5e6383b8300c41abf8ff
SHA256735b988b035d6f7ec33f7f548d41729056c7044490ca1845ca59895dad7866d4
SHA512bb11ecd5f6a03c27c5966aa51630643c44a23152df378f5cf3aa0ab0d4778265720e2c21f49df22329773fa2877567eed967aebe9dd067e6d6bda9bd676e3383
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\SYSTEM~1.TXTMD5
85589e308ad2fe1f33606dafc059586a
SHA1d4cfa910dafec111a367776abd3cfc2bdcc2fe6e
SHA25613dd6270cd997470162a05137a638a6a314f128385e6b7c97b4d5055c366a89a
SHA5126ac15259ab1c076d1474dbeda0e9edf2b39ac5d2e25ba4d01661ed4809ace166a51eb351059febba0770803f62c992253680eb6eaad49933a849b462c2e51ccb
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\_Chrome\DEFAUL~1.BINMD5
d4026455697acb78d4f621b54352b4f0
SHA1f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9
SHA2562e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624
SHA512efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\VbhDxXpIwjZgG\files_\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
f821b460a6ed4036911ba2eb5cf26f2c
SHA16330a75c3220b7789a2fc653c434c784c90ab5c1
SHA25673e4172aa509c32ea9e83a4814150d614f5dd1bc14c2d56fc3dd79d72b573e4d
SHA5129f5e0a6a129ed2e25cf3f04de3c508fcd38cd50bce2de0102cce315efb2b9d647150da2654393f64418845f7d0d706a66f5575ea652b9cc7f5c6cb79ac2c44d6
-
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exeMD5
f821b460a6ed4036911ba2eb5cf26f2c
SHA16330a75c3220b7789a2fc653c434c784c90ab5c1
SHA25673e4172aa509c32ea9e83a4814150d614f5dd1bc14c2d56fc3dd79d72b573e4d
SHA5129f5e0a6a129ed2e25cf3f04de3c508fcd38cd50bce2de0102cce315efb2b9d647150da2654393f64418845f7d0d706a66f5575ea652b9cc7f5c6cb79ac2c44d6
-
memory/60-290-0x0000000000000000-mapping.dmp
-
memory/60-292-0x0000000000750000-0x000000000075B000-memory.dmpFilesize
44KB
-
memory/60-291-0x0000000000760000-0x0000000000767000-memory.dmpFilesize
28KB
-
memory/336-298-0x00000000004A0000-0x00000000004A5000-memory.dmpFilesize
20KB
-
memory/336-299-0x0000000000490000-0x0000000000499000-memory.dmpFilesize
36KB
-
memory/336-297-0x0000000000000000-mapping.dmp
-
memory/352-295-0x00000000007D0000-0x00000000007DE000-memory.dmpFilesize
56KB
-
memory/352-294-0x00000000007E0000-0x00000000007E9000-memory.dmpFilesize
36KB
-
memory/352-293-0x0000000000000000-mapping.dmp
-
memory/492-218-0x0000000000000000-mapping.dmp
-
memory/496-208-0x0000000000000000-mapping.dmp
-
memory/652-219-0x0000000000000000-mapping.dmp
-
memory/668-174-0x0000000000000000-mapping.dmp
-
memory/756-209-0x0000000000000000-mapping.dmp
-
memory/848-220-0x0000000000000000-mapping.dmp
-
memory/896-224-0x0000000000000000-mapping.dmp
-
memory/908-135-0x0000000000400000-0x0000000000445000-memory.dmpFilesize
276KB
-
memory/908-133-0x0000000000728000-0x0000000000731000-memory.dmpFilesize
36KB
-
memory/908-130-0x0000000000000000-mapping.dmp
-
memory/908-134-0x0000000000450000-0x000000000059A000-memory.dmpFilesize
1.3MB
-
memory/1152-141-0x0000000002080000-0x00000000020C7000-memory.dmpFilesize
284KB
-
memory/1152-142-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/1152-137-0x0000000000000000-mapping.dmp
-
memory/1176-309-0x0000000000000000-mapping.dmp
-
memory/1176-310-0x00000000010D0000-0x00000000010D7000-memory.dmpFilesize
28KB
-
memory/1176-311-0x00000000010C0000-0x00000000010CD000-memory.dmpFilesize
52KB
-
memory/1188-175-0x0000000000000000-mapping.dmp
-
memory/1232-287-0x00000000030E0000-0x000000000314B000-memory.dmpFilesize
428KB
-
memory/1232-286-0x0000000003150000-0x00000000031C5000-memory.dmpFilesize
468KB
-
memory/1232-284-0x0000000000000000-mapping.dmp
-
memory/1332-181-0x0000000000000000-mapping.dmp
-
memory/1392-258-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-252-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-319-0x000001D3998E0000-0x000001D3998E1000-memory.dmpFilesize
4KB
-
memory/1392-244-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-241-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-240-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-239-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-238-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-237-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-245-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-236-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-235-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-247-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-248-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-233-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-249-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-251-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-243-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-253-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-254-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-257-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-260-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-261-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-263-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-265-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-266-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-267-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-232-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-231-0x00007FF9EC830000-0x00007FF9EC89B000-memory.dmpFilesize
428KB
-
memory/1392-296-0x000001D3998D0000-0x000001D3998D1000-memory.dmpFilesize
4KB
-
memory/1392-303-0x000001D39B920000-0x000001D39B921000-memory.dmpFilesize
4KB
-
memory/1392-316-0x000001D39B9D0000-0x000001D39B9D1000-memory.dmpFilesize
4KB
-
memory/1392-317-0x000001D39B9D0000-0x000001D39B9D1000-memory.dmpFilesize
4KB
-
memory/1432-172-0x0000000000000000-mapping.dmp
-
memory/1500-161-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/1500-180-0x0000000005EB0000-0x0000000005EB1000-memory.dmpFilesize
4KB
-
memory/1500-150-0x0000000004C00000-0x0000000004C01000-memory.dmpFilesize
4KB
-
memory/1500-153-0x00000000024A0000-0x00000000024CC000-memory.dmpFilesize
176KB
-
memory/1500-149-0x0000000002090000-0x00000000020BE000-memory.dmpFilesize
184KB
-
memory/1500-154-0x0000000004BF0000-0x0000000004BF1000-memory.dmpFilesize
4KB
-
memory/1500-155-0x0000000004BF2000-0x0000000004BF3000-memory.dmpFilesize
4KB
-
memory/1500-156-0x0000000004BF3000-0x0000000004BF4000-memory.dmpFilesize
4KB
-
memory/1500-158-0x0000000005100000-0x0000000005101000-memory.dmpFilesize
4KB
-
memory/1500-160-0x0000000005730000-0x0000000005731000-memory.dmpFilesize
4KB
-
memory/1500-162-0x0000000005880000-0x0000000005881000-memory.dmpFilesize
4KB
-
memory/1500-148-0x0000000000400000-0x0000000000468000-memory.dmpFilesize
416KB
-
memory/1500-163-0x0000000004BF4000-0x0000000004BF6000-memory.dmpFilesize
8KB
-
memory/1500-164-0x00000000058D0000-0x00000000058D1000-memory.dmpFilesize
4KB
-
memory/1500-202-0x0000000006860000-0x0000000006861000-memory.dmpFilesize
4KB
-
memory/1500-147-0x0000000001F50000-0x0000000001F89000-memory.dmpFilesize
228KB
-
memory/1500-146-0x00000000006C8000-0x00000000006F4000-memory.dmpFilesize
176KB
-
memory/1500-143-0x0000000000000000-mapping.dmp
-
memory/1500-201-0x0000000006680000-0x0000000006681000-memory.dmpFilesize
4KB
-
memory/1500-176-0x0000000005B70000-0x0000000005B71000-memory.dmpFilesize
4KB
-
memory/1500-177-0x0000000005C60000-0x0000000005C61000-memory.dmpFilesize
4KB
-
memory/1500-178-0x0000000005C30000-0x0000000005C31000-memory.dmpFilesize
4KB
-
memory/1548-182-0x0000000000000000-mapping.dmp
-
memory/1596-214-0x0000000000000000-mapping.dmp
-
memory/1756-183-0x0000000000000000-mapping.dmp
-
memory/2124-210-0x0000000000000000-mapping.dmp
-
memory/2132-190-0x0000000000000000-mapping.dmp
-
memory/2308-312-0x0000012EEF160000-0x0000012EEF161000-memory.dmpFilesize
4KB
-
memory/2316-313-0x000002009BE20000-0x000002009BE21000-memory.dmpFilesize
4KB
-
memory/2392-221-0x0000000000000000-mapping.dmp
-
memory/2444-314-0x0000019FD0110000-0x0000019FD0111000-memory.dmpFilesize
4KB
-
memory/2716-200-0x0000000000000000-mapping.dmp
-
memory/2776-151-0x00000000042C0000-0x00000000042C2000-memory.dmpFilesize
8KB
-
memory/2776-157-0x0000000002D60000-0x0000000002D6F000-memory.dmpFilesize
60KB
-
memory/2776-229-0x00000000042C0000-0x00000000042C2000-memory.dmpFilesize
8KB
-
memory/2776-136-0x0000000002BC0000-0x0000000002BD6000-memory.dmpFilesize
88KB
-
memory/2776-227-0x00000000042C0000-0x00000000042C2000-memory.dmpFilesize
8KB
-
memory/2776-230-0x00000000042C0000-0x00000000042C2000-memory.dmpFilesize
8KB
-
memory/2776-152-0x00000000042C0000-0x00000000042C2000-memory.dmpFilesize
8KB
-
memory/2776-118-0x0000000002390000-0x00000000023A6000-memory.dmpFilesize
88KB
-
memory/2820-159-0x0000000000000000-mapping.dmp
-
memory/2836-199-0x0000000000000000-mapping.dmp
-
memory/2864-222-0x0000000000000000-mapping.dmp
-
memory/3200-204-0x0000000000000000-mapping.dmp
-
memory/3212-318-0x0000023EF3DC0000-0x0000023EF3DC1000-memory.dmpFilesize
4KB
-
memory/3248-215-0x0000000000000000-mapping.dmp
-
memory/3280-211-0x0000000000000000-mapping.dmp
-
memory/3364-213-0x0000000000000000-mapping.dmp
-
memory/3488-315-0x0000028C89C50000-0x0000028C89C51000-memory.dmpFilesize
4KB
-
memory/3572-225-0x0000000000000000-mapping.dmp
-
memory/3616-206-0x0000000000000000-mapping.dmp
-
memory/3636-205-0x0000000000000000-mapping.dmp
-
memory/3800-212-0x0000000000000000-mapping.dmp
-
memory/3932-207-0x0000000000000000-mapping.dmp
-
memory/3940-165-0x0000000000000000-mapping.dmp
-
memory/4104-179-0x0000000000000000-mapping.dmp
-
memory/4128-217-0x0000000000000000-mapping.dmp
-
memory/4184-226-0x0000000000000000-mapping.dmp
-
memory/4216-117-0x0000000000400000-0x0000000000445000-memory.dmpFilesize
276KB
-
memory/4216-116-0x0000000000540000-0x000000000068A000-memory.dmpFilesize
1.3MB
-
memory/4236-167-0x0000000000000000-mapping.dmp
-
memory/4256-166-0x0000000000000000-mapping.dmp
-
memory/4284-289-0x00000000001E0000-0x00000000001EC000-memory.dmpFilesize
48KB
-
memory/4284-288-0x00000000001F0000-0x00000000001F7000-memory.dmpFilesize
28KB
-
memory/4284-285-0x0000000000000000-mapping.dmp
-
memory/4292-256-0x0000000000000000-mapping.dmp
-
memory/4332-122-0x0000000000848000-0x00000000008C8000-memory.dmpFilesize
512KB
-
memory/4332-119-0x0000000000000000-mapping.dmp
-
memory/4332-123-0x0000000000780000-0x0000000000811000-memory.dmpFilesize
580KB
-
memory/4332-124-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/4396-223-0x0000000000000000-mapping.dmp
-
memory/4484-216-0x0000000000000000-mapping.dmp
-
memory/4564-129-0x0000000000400000-0x00000000004BC000-memory.dmpFilesize
752KB
-
memory/4564-128-0x00000000006A9000-0x0000000000729000-memory.dmpFilesize
512KB
-
memory/4564-308-0x00000000001C0000-0x00000000001CB000-memory.dmpFilesize
44KB
-
memory/4564-125-0x0000000000000000-mapping.dmp
-
memory/4564-307-0x00000000001D0000-0x00000000001D1000-memory.dmpFilesize
4KB
-
memory/4804-304-0x0000000000000000-mapping.dmp
-
memory/4804-306-0x0000000002D20000-0x0000000002D2B000-memory.dmpFilesize
44KB
-
memory/4804-305-0x0000000002D30000-0x0000000002D36000-memory.dmpFilesize
24KB
-
memory/4812-301-0x00000000005F0000-0x00000000005F6000-memory.dmpFilesize
24KB
-
memory/4812-302-0x00000000005E0000-0x00000000005EC000-memory.dmpFilesize
48KB
-
memory/4812-300-0x0000000000000000-mapping.dmp
-
memory/4836-168-0x0000000000000000-mapping.dmp
-
memory/4940-169-0x0000000000000000-mapping.dmp
-
memory/5008-171-0x00000207A8E20000-0x00000207A8E22000-memory.dmpFilesize
8KB
-
memory/5008-170-0x00000207A8E20000-0x00000207A8E22000-memory.dmpFilesize
8KB
-
memory/5076-203-0x0000000000000000-mapping.dmp
-
memory/5100-173-0x0000000000000000-mapping.dmp