Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
05-12-2021 11:25
Static task
static1
Behavioral task
behavioral1
Sample
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe
Resource
win10-en-20211014
General
-
Target
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe
-
Size
278KB
-
MD5
693b4de22062e5a12d3db5ee3df2319b
-
SHA1
942429fbc513a343567f550c801812356d9fa670
-
SHA256
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc
-
SHA512
5b238f0caedf77607da6f9e626c6dfeda2451d9c08d960b8909a97f445bfdac690a06a76c33b290e87103caf31dcab76955772a14844a9702b84399c45ef4618
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
1.8.3-hotfix
b620be4c85b4051a92040003edbc322be4eb082d
-
url4cnc
http://91.219.236.207/capibar
http://185.225.19.18/capibar
http://91.219.237.227/capibar
https://t.me/capibar
Extracted
raccoon
1.8.3-hotfix
c14e8219a761194140b8dfc2abce3a8292dd059a
-
url4cnc
http://94.158.245.137/h_electricryptors2
http://91.219.236.27/h_electricryptors2
http://94.158.245.167/h_electricryptors2
http://185.163.204.216/h_electricryptors2
http://185.225.19.238/h_electricryptors2
http://185.163.204.218/h_electricryptors2
https://t.me/h_electricryptors2
Extracted
raccoon
1.8.3-hotfix
a1fcef6b211f7efaa652483b438c193569359f50
-
url4cnc
http://94.158.245.137/duglassa1
http://91.219.236.27/duglassa1
http://94.158.245.167/duglassa1
http://185.163.204.216/duglassa1
http://185.225.19.238/duglassa1
http://185.163.204.218/duglassa1
https://t.me/duglassa1
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Extracted
redline
re
87.251.73.109:37261
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1400-168-0x00000000010A0000-0x0000000001204000-memory.dmp family_redline behavioral1/memory/2036-239-0x0000000000418EF2-mapping.dmp family_redline behavioral1/memory/2036-237-0x0000000000400000-0x0000000000420000-memory.dmp family_redline behavioral1/memory/2036-248-0x00000000053E0000-0x00000000059E6000-memory.dmp family_redline behavioral1/memory/496-249-0x0000000000400000-0x000000000043C000-memory.dmp family_redline behavioral1/memory/496-250-0x000000000043702E-mapping.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 17 IoCs
Processes:
179B.exe179B.exe4D23.exeBF47.exeBF47.exeCF26.exeFAEA.exe369D.exe4766.exe54B6.exea_2021-12-05_10-25.exeBlatters.exeFetlocked.exetkools.exeFetlocked.exeBlatters.exeFetlocked.exepid process 3840 179B.exe 1608 179B.exe 2032 4D23.exe 1436 BF47.exe 364 BF47.exe 1392 CF26.exe 3872 FAEA.exe 1400 369D.exe 952 4766.exe 2084 54B6.exe 2320 a_2021-12-05_10-25.exe 3940 Blatters.exe 2172 Fetlocked.exe 3996 tkools.exe 2304 Fetlocked.exe 2036 Blatters.exe 496 Fetlocked.exe -
Deletes itself 1 IoCs
Processes:
pid process 3020 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
FAEA.exe369D.exepid process 3872 FAEA.exe 1400 369D.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe179B.exeBF47.exeBlatters.exeFetlocked.exedescription pid process target process PID 2648 set thread context of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 3840 set thread context of 1608 3840 179B.exe 179B.exe PID 1436 set thread context of 364 1436 BF47.exe BF47.exe PID 3940 set thread context of 2036 3940 Blatters.exe Blatters.exe PID 2172 set thread context of 496 2172 Fetlocked.exe Fetlocked.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
4D23.exec4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe179B.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4D23.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4D23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 179B.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 179B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 179B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4D23.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exepid process 416 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe 416 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 3020 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3020 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe179B.exe4D23.exepid process 416 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe 1608 179B.exe 2032 4D23.exe 3020 3020 3020 3020 -
Suspicious use of AdjustPrivilegeToken 59 IoCs
Processes:
369D.exeBlatters.exeFetlocked.exedescription pid process Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeDebugPrivilege 1400 369D.exe Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeDebugPrivilege 2036 Blatters.exe Token: SeDebugPrivilege 496 Fetlocked.exe Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 Token: SeShutdownPrivilege 3020 Token: SeCreatePagefilePrivilege 3020 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe179B.exeBF47.exe4766.exeBlatters.exedescription pid process target process PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 2648 wrote to memory of 416 2648 c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe PID 3020 wrote to memory of 3840 3020 179B.exe PID 3020 wrote to memory of 3840 3020 179B.exe PID 3020 wrote to memory of 3840 3020 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3840 wrote to memory of 1608 3840 179B.exe 179B.exe PID 3020 wrote to memory of 2032 3020 4D23.exe PID 3020 wrote to memory of 2032 3020 4D23.exe PID 3020 wrote to memory of 2032 3020 4D23.exe PID 3020 wrote to memory of 1436 3020 BF47.exe PID 3020 wrote to memory of 1436 3020 BF47.exe PID 3020 wrote to memory of 1436 3020 BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 1436 wrote to memory of 364 1436 BF47.exe BF47.exe PID 3020 wrote to memory of 1392 3020 CF26.exe PID 3020 wrote to memory of 1392 3020 CF26.exe PID 3020 wrote to memory of 1392 3020 CF26.exe PID 3020 wrote to memory of 3872 3020 FAEA.exe PID 3020 wrote to memory of 3872 3020 FAEA.exe PID 3020 wrote to memory of 3872 3020 FAEA.exe PID 3020 wrote to memory of 1620 3020 explorer.exe PID 3020 wrote to memory of 1620 3020 explorer.exe PID 3020 wrote to memory of 1620 3020 explorer.exe PID 3020 wrote to memory of 1620 3020 explorer.exe PID 3020 wrote to memory of 1276 3020 explorer.exe PID 3020 wrote to memory of 1276 3020 explorer.exe PID 3020 wrote to memory of 1276 3020 explorer.exe PID 3020 wrote to memory of 1400 3020 369D.exe PID 3020 wrote to memory of 1400 3020 369D.exe PID 3020 wrote to memory of 1400 3020 369D.exe PID 3020 wrote to memory of 952 3020 4766.exe PID 3020 wrote to memory of 952 3020 4766.exe PID 3020 wrote to memory of 2084 3020 54B6.exe PID 3020 wrote to memory of 2084 3020 54B6.exe PID 3020 wrote to memory of 2084 3020 54B6.exe PID 952 wrote to memory of 2320 952 4766.exe a_2021-12-05_10-25.exe PID 952 wrote to memory of 2320 952 4766.exe a_2021-12-05_10-25.exe PID 952 wrote to memory of 2320 952 4766.exe a_2021-12-05_10-25.exe PID 952 wrote to memory of 3940 952 4766.exe Blatters.exe PID 952 wrote to memory of 3940 952 4766.exe Blatters.exe PID 952 wrote to memory of 3940 952 4766.exe Blatters.exe PID 952 wrote to memory of 2172 952 4766.exe Fetlocked.exe PID 952 wrote to memory of 2172 952 4766.exe Fetlocked.exe PID 952 wrote to memory of 2172 952 4766.exe Fetlocked.exe PID 3940 wrote to memory of 2036 3940 Blatters.exe Blatters.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe"C:\Users\Admin\AppData\Local\Temp\c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe"C:\Users\Admin\AppData\Local\Temp\c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\179B.exeC:\Users\Admin\AppData\Local\Temp\179B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\179B.exeC:\Users\Admin\AppData\Local\Temp\179B.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4D23.exeC:\Users\Admin\AppData\Local\Temp\4D23.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeC:\Users\Admin\AppData\Local\Temp\BF47.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeC:\Users\Admin\AppData\Local\Temp\BF47.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\CF26.exeC:\Users\Admin\AppData\Local\Temp\CF26.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\FAEA.exeC:\Users\Admin\AppData\Local\Temp\FAEA.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\369D.exeC:\Users\Admin\AppData\Local\Temp\369D.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\4766.exeC:\Users\Admin\AppData\Local\Temp\4766.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a_2021-12-05_10-25.exe"C:\Users\Admin\AppData\Local\Temp\a_2021-12-05_10-25.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Blatters.exe"C:\Users\Admin\AppData\Local\Temp\Blatters.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Blatters.exeC:\Users\Admin\AppData\Local\Temp\Blatters.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exe"C:\Users\Admin\AppData\Local\Temp\Fetlocked.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeC:\Users\Admin\AppData\Local\Temp\Fetlocked.exe3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeC:\Users\Admin\AppData\Local\Temp\Fetlocked.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\54B6.exeC:\Users\Admin\AppData\Local\Temp\54B6.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Blatters.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Fetlocked.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\03795181499162622812MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\179B.exeMD5
693b4de22062e5a12d3db5ee3df2319b
SHA1942429fbc513a343567f550c801812356d9fa670
SHA256c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc
SHA5125b238f0caedf77607da6f9e626c6dfeda2451d9c08d960b8909a97f445bfdac690a06a76c33b290e87103caf31dcab76955772a14844a9702b84399c45ef4618
-
C:\Users\Admin\AppData\Local\Temp\179B.exeMD5
693b4de22062e5a12d3db5ee3df2319b
SHA1942429fbc513a343567f550c801812356d9fa670
SHA256c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc
SHA5125b238f0caedf77607da6f9e626c6dfeda2451d9c08d960b8909a97f445bfdac690a06a76c33b290e87103caf31dcab76955772a14844a9702b84399c45ef4618
-
C:\Users\Admin\AppData\Local\Temp\179B.exeMD5
693b4de22062e5a12d3db5ee3df2319b
SHA1942429fbc513a343567f550c801812356d9fa670
SHA256c4d26f85d5647191f4866076fa1e757c0cbfeebc03db9b8358747b31bcbc55cc
SHA5125b238f0caedf77607da6f9e626c6dfeda2451d9c08d960b8909a97f445bfdac690a06a76c33b290e87103caf31dcab76955772a14844a9702b84399c45ef4618
-
C:\Users\Admin\AppData\Local\Temp\369D.exeMD5
31eabb669dbd8262f6366b89b7b390be
SHA1938aeea46b76f375afd85a22a3edbafe6db7a8b4
SHA2566d6db3d2350de0ba05603b3ed3238bb5022ca300882fd4e709a6f424e9902c2e
SHA5124e281da8f422f413e27c6465c18d3889958cb9339bc18c8b482749d93ef262ca91a8c1275117ad7060fc8a02a6e118d79fa6eaf96a97face8283c3203c1b9060
-
C:\Users\Admin\AppData\Local\Temp\369D.exeMD5
31eabb669dbd8262f6366b89b7b390be
SHA1938aeea46b76f375afd85a22a3edbafe6db7a8b4
SHA2566d6db3d2350de0ba05603b3ed3238bb5022ca300882fd4e709a6f424e9902c2e
SHA5124e281da8f422f413e27c6465c18d3889958cb9339bc18c8b482749d93ef262ca91a8c1275117ad7060fc8a02a6e118d79fa6eaf96a97face8283c3203c1b9060
-
C:\Users\Admin\AppData\Local\Temp\4766.exeMD5
60c06c9b64be7bb8a25e8391b31bebf9
SHA1108de69ad28a72bbc55cda2fade99275a7bcdda3
SHA256adf3fb72f8855baa050d1e7c5a15944abeb1ae775570aee6bfab1b2d6ac26a45
SHA512cbe53dd6f820fa09094c6f796d8efbddadbf3e6278ceb9dfcc5367123d6c7079f673fb5bd9a5cd60470b0a1986f3fb18e0e7e0c51c12b488c50c8b9c3ec67c5c
-
C:\Users\Admin\AppData\Local\Temp\4766.exeMD5
60c06c9b64be7bb8a25e8391b31bebf9
SHA1108de69ad28a72bbc55cda2fade99275a7bcdda3
SHA256adf3fb72f8855baa050d1e7c5a15944abeb1ae775570aee6bfab1b2d6ac26a45
SHA512cbe53dd6f820fa09094c6f796d8efbddadbf3e6278ceb9dfcc5367123d6c7079f673fb5bd9a5cd60470b0a1986f3fb18e0e7e0c51c12b488c50c8b9c3ec67c5c
-
C:\Users\Admin\AppData\Local\Temp\4D23.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\4D23.exeMD5
df13fac0d8b182e4d8b9a02ba87a9571
SHA1b2187debc6fde96e08d5014ce4f1af5cf568bce5
SHA256af64f5b2b6c4cc63b0ca4bb48f369eba1629886d85e289a469a5c9612c4a5ee3
SHA512bc842a80509bda8afff6e12f5b5c64ccf7f1d7360f99f63cebbc1f21936a15487ec16bde3c2acff22c49ebcedf5c426621d6f69503f4968aacc8e75611e3a816
-
C:\Users\Admin\AppData\Local\Temp\54B6.exeMD5
1ac477e104183f2033ad5caabd8b9a76
SHA1e1f62d9cd12c2f3bd4338791090315fa3bda4e20
SHA25623e3ab4aa0841cf162fb7b324aa458ce04d47c325fe5ca47ccd3abc77ccbd86b
SHA51261e1d6e4a58fecddddb8aae1883439ebba1109ec900ef9a2fbcbb970829d67375347965933bf74d4915cf6dbc8ad2ea4d4d460d463c62f8f7ade1e421843b848
-
C:\Users\Admin\AppData\Local\Temp\54B6.exeMD5
1ac477e104183f2033ad5caabd8b9a76
SHA1e1f62d9cd12c2f3bd4338791090315fa3bda4e20
SHA25623e3ab4aa0841cf162fb7b324aa458ce04d47c325fe5ca47ccd3abc77ccbd86b
SHA51261e1d6e4a58fecddddb8aae1883439ebba1109ec900ef9a2fbcbb970829d67375347965933bf74d4915cf6dbc8ad2ea4d4d460d463c62f8f7ade1e421843b848
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
766aa3be74ccd42b26b75ff99d7fd197
SHA1febbfe50a03217047f3bf1ef090bf6618b3de982
SHA256f92fd373020eeb31ba6ff399753e3ceda56507d79b6d7171ae3b2476895cc2a8
SHA51216aa5c4bf037780028ed4a913e6659f51706d6c613c40db5f2c581fd8547a01d0d41a6cf47b98dac00a12714fea4775120b0b2146d40f8d6812c3b82496ce3e4
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
766aa3be74ccd42b26b75ff99d7fd197
SHA1febbfe50a03217047f3bf1ef090bf6618b3de982
SHA256f92fd373020eeb31ba6ff399753e3ceda56507d79b6d7171ae3b2476895cc2a8
SHA51216aa5c4bf037780028ed4a913e6659f51706d6c613c40db5f2c581fd8547a01d0d41a6cf47b98dac00a12714fea4775120b0b2146d40f8d6812c3b82496ce3e4
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\BF47.exeMD5
45cf4ea0f9268e7306da20dea9d14210
SHA13574746d1d089f9989ee2c9e2048f014a61100ca
SHA256919ccc1f90bae8d58cc6ef51359e15af853de90a7083c640b5c2a99eb1a61281
SHA5123996f207a4973428f7ecb419f16fdafb7fa6213cb0a9a7b48405baae10f85a4a381664291f4c59d5c6bc7158335ca07944fb712dc7dc14a3a393f9af490dfe6d
-
C:\Users\Admin\AppData\Local\Temp\Blatters.exeMD5
1562c28dfff594a017943fcdb66593ca
SHA18c2511440f467758ca9d46993b705a226548fdf5
SHA256f8082068c9c0d4c1540cd09b0a81b2f707fa4bbc4d21cfe001a8547c341ab358
SHA51245f876de140037c28b6f5adc2cf7562552956643465451bba53685c72c490453815c65f1ae0ccbd83573d9e042f1fa7aa6d865276287922d6d96579d4b41cbc3
-
C:\Users\Admin\AppData\Local\Temp\Blatters.exeMD5
1562c28dfff594a017943fcdb66593ca
SHA18c2511440f467758ca9d46993b705a226548fdf5
SHA256f8082068c9c0d4c1540cd09b0a81b2f707fa4bbc4d21cfe001a8547c341ab358
SHA51245f876de140037c28b6f5adc2cf7562552956643465451bba53685c72c490453815c65f1ae0ccbd83573d9e042f1fa7aa6d865276287922d6d96579d4b41cbc3
-
C:\Users\Admin\AppData\Local\Temp\Blatters.exeMD5
1562c28dfff594a017943fcdb66593ca
SHA18c2511440f467758ca9d46993b705a226548fdf5
SHA256f8082068c9c0d4c1540cd09b0a81b2f707fa4bbc4d21cfe001a8547c341ab358
SHA51245f876de140037c28b6f5adc2cf7562552956643465451bba53685c72c490453815c65f1ae0ccbd83573d9e042f1fa7aa6d865276287922d6d96579d4b41cbc3
-
C:\Users\Admin\AppData\Local\Temp\CF26.exeMD5
ef7c513d3695a4b54a42b9da519b7d6d
SHA18127b36a2856b29f73d32322e5d61c7277caad20
SHA2566d6f4dead6e8c49fad1b5316cc14190f42fdf86a3f7c549bf24abc5a1683e78b
SHA512bf89b2398bbc6e7f8d498259197617f18d3ccf8a15a8841682125ae32664094cf3c0872e9b539553376f46c8d7c94c59615a02c2fc4c4eefe768653e66d9d0df
-
C:\Users\Admin\AppData\Local\Temp\CF26.exeMD5
ef7c513d3695a4b54a42b9da519b7d6d
SHA18127b36a2856b29f73d32322e5d61c7277caad20
SHA2566d6f4dead6e8c49fad1b5316cc14190f42fdf86a3f7c549bf24abc5a1683e78b
SHA512bf89b2398bbc6e7f8d498259197617f18d3ccf8a15a8841682125ae32664094cf3c0872e9b539553376f46c8d7c94c59615a02c2fc4c4eefe768653e66d9d0df
-
C:\Users\Admin\AppData\Local\Temp\FAEA.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\FAEA.exeMD5
1b207ddcd4c46699ff46c7fa7ed2de4b
SHA164fe034264b3aad0c5b803a4c0e6a9ff33659a9c
SHA25611144b039458f096d493a47411c028996236b8a75ed4264558f3edeb22af88f5
SHA5124e51c4ea346c7ee05d7f67472efa6bd24fdb412be305ab2205ce8ae9a9813c06c4577433ad6fad115eed23f027bda69536fea69d89862b023b7924597f2ddc3d
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\Fetlocked.exeMD5
399289fefce9004754aa98ca823ebc14
SHA1402220a50be951b176d233a49e1f302a08857ba7
SHA256557d00f1681acc8fc820823e03fa62fa5fbdfe38233d3ecfaa7b49291cff901a
SHA512e088867327e025a03ffeda5cbc766ae5e7ceef01a25ec6c96a0632f8814126b232d41d2b7027ae129c0a2284a8fdeec84a4beeb73996bf1a4d704665ab3f6e4f
-
C:\Users\Admin\AppData\Local\Temp\a_2021-12-05_10-25.exeMD5
766aa3be74ccd42b26b75ff99d7fd197
SHA1febbfe50a03217047f3bf1ef090bf6618b3de982
SHA256f92fd373020eeb31ba6ff399753e3ceda56507d79b6d7171ae3b2476895cc2a8
SHA51216aa5c4bf037780028ed4a913e6659f51706d6c613c40db5f2c581fd8547a01d0d41a6cf47b98dac00a12714fea4775120b0b2146d40f8d6812c3b82496ce3e4
-
C:\Users\Admin\AppData\Local\Temp\a_2021-12-05_10-25.exeMD5
766aa3be74ccd42b26b75ff99d7fd197
SHA1febbfe50a03217047f3bf1ef090bf6618b3de982
SHA256f92fd373020eeb31ba6ff399753e3ceda56507d79b6d7171ae3b2476895cc2a8
SHA51216aa5c4bf037780028ed4a913e6659f51706d6c613c40db5f2c581fd8547a01d0d41a6cf47b98dac00a12714fea4775120b0b2146d40f8d6812c3b82496ce3e4
-
memory/364-150-0x0000000004850000-0x00000000048DF000-memory.dmpFilesize
572KB
-
memory/364-148-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/364-152-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/364-144-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/364-149-0x0000000002C10000-0x0000000002C5F000-memory.dmpFilesize
316KB
-
memory/364-140-0x0000000000400000-0x0000000002BB9000-memory.dmpFilesize
39.7MB
-
memory/364-141-0x0000000000401E7A-mapping.dmp
-
memory/416-117-0x0000000000402F47-mapping.dmp
-
memory/416-116-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/496-261-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/496-255-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/496-250-0x000000000043702E-mapping.dmp
-
memory/496-249-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/772-234-0x0000000000000000-mapping.dmp
-
memory/952-179-0x0000000000000000-mapping.dmp
-
memory/952-183-0x0000000000980000-0x0000000000981000-memory.dmpFilesize
4KB
-
memory/1120-233-0x0000000000000000-mapping.dmp
-
memory/1276-162-0x0000000000000000-mapping.dmp
-
memory/1276-164-0x0000000000180000-0x000000000018C000-memory.dmpFilesize
48KB
-
memory/1276-163-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/1392-151-0x00000000006A8000-0x00000000006F7000-memory.dmpFilesize
316KB
-
memory/1392-153-0x0000000000510000-0x000000000065A000-memory.dmpFilesize
1.3MB
-
memory/1392-145-0x0000000000000000-mapping.dmp
-
memory/1392-154-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/1400-175-0x0000000071690000-0x0000000071710000-memory.dmpFilesize
512KB
-
memory/1400-165-0x0000000000000000-mapping.dmp
-
memory/1400-176-0x0000000005E70000-0x0000000005E71000-memory.dmpFilesize
4KB
-
memory/1400-177-0x00000000057B0000-0x00000000057B1000-memory.dmpFilesize
4KB
-
memory/1400-178-0x0000000005970000-0x0000000005971000-memory.dmpFilesize
4KB
-
memory/1400-172-0x0000000076510000-0x0000000076601000-memory.dmpFilesize
964KB
-
memory/1400-171-0x0000000076740000-0x0000000076902000-memory.dmpFilesize
1.8MB
-
memory/1400-170-0x0000000002C10000-0x0000000002C55000-memory.dmpFilesize
276KB
-
memory/1400-182-0x0000000005850000-0x0000000005851000-memory.dmpFilesize
4KB
-
memory/1400-169-0x0000000000EF0000-0x0000000000EF1000-memory.dmpFilesize
4KB
-
memory/1400-185-0x0000000005810000-0x0000000005811000-memory.dmpFilesize
4KB
-
memory/1400-186-0x0000000075D10000-0x0000000076294000-memory.dmpFilesize
5.5MB
-
memory/1400-187-0x0000000074490000-0x00000000757D8000-memory.dmpFilesize
19.3MB
-
memory/1400-188-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/1400-189-0x000000006F900000-0x000000006F94B000-memory.dmpFilesize
300KB
-
memory/1400-168-0x00000000010A0000-0x0000000001204000-memory.dmpFilesize
1.4MB
-
memory/1400-203-0x0000000008690000-0x0000000008691000-memory.dmpFilesize
4KB
-
memory/1400-173-0x00000000010A0000-0x00000000010A1000-memory.dmpFilesize
4KB
-
memory/1400-202-0x0000000007F90000-0x0000000007F91000-memory.dmpFilesize
4KB
-
memory/1400-201-0x0000000007080000-0x0000000007081000-memory.dmpFilesize
4KB
-
memory/1400-200-0x0000000006720000-0x0000000006721000-memory.dmpFilesize
4KB
-
memory/1400-196-0x0000000005B50000-0x0000000005B51000-memory.dmpFilesize
4KB
-
memory/1400-197-0x0000000005C70000-0x0000000005C71000-memory.dmpFilesize
4KB
-
memory/1400-198-0x0000000006980000-0x0000000006981000-memory.dmpFilesize
4KB
-
memory/1400-199-0x0000000005E10000-0x0000000005E11000-memory.dmpFilesize
4KB
-
memory/1436-136-0x0000000000000000-mapping.dmp
-
memory/1436-139-0x0000000000558000-0x00000000005C8000-memory.dmpFilesize
448KB
-
memory/1436-143-0x0000000002140000-0x00000000021C2000-memory.dmpFilesize
520KB
-
memory/1480-235-0x0000000000000000-mapping.dmp
-
memory/1608-125-0x0000000000402F47-mapping.dmp
-
memory/1620-161-0x0000000000C00000-0x0000000000C6B000-memory.dmpFilesize
428KB
-
memory/1620-160-0x0000000000C70000-0x0000000000CE4000-memory.dmpFilesize
464KB
-
memory/1620-159-0x0000000000000000-mapping.dmp
-
memory/2032-129-0x0000000000000000-mapping.dmp
-
memory/2032-132-0x0000000002C50000-0x0000000002C59000-memory.dmpFilesize
36KB
-
memory/2032-134-0x0000000000400000-0x0000000002B64000-memory.dmpFilesize
39.4MB
-
memory/2032-133-0x0000000002C60000-0x0000000002C69000-memory.dmpFilesize
36KB
-
memory/2036-248-0x00000000053E0000-0x00000000059E6000-memory.dmpFilesize
6.0MB
-
memory/2036-247-0x00000000054F0000-0x00000000054F1000-memory.dmpFilesize
4KB
-
memory/2036-237-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2036-239-0x0000000000418EF2-mapping.dmp
-
memory/2084-194-0x00000000020B0000-0x000000000213F000-memory.dmpFilesize
572KB
-
memory/2084-190-0x0000000000000000-mapping.dmp
-
memory/2084-193-0x0000000000528000-0x0000000000577000-memory.dmpFilesize
316KB
-
memory/2084-195-0x0000000000400000-0x0000000000491000-memory.dmpFilesize
580KB
-
memory/2172-209-0x0000000000000000-mapping.dmp
-
memory/2172-215-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/2172-225-0x0000000002A50000-0x0000000002A51000-memory.dmpFilesize
4KB
-
memory/2320-204-0x0000000000000000-mapping.dmp
-
memory/2320-226-0x00000000020B0000-0x00000000020E8000-memory.dmpFilesize
224KB
-
memory/2320-227-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/2648-118-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/3020-128-0x0000000001FA0000-0x0000000001FB6000-memory.dmpFilesize
88KB
-
memory/3020-135-0x0000000002400000-0x0000000002416000-memory.dmpFilesize
88KB
-
memory/3020-119-0x0000000000520000-0x0000000000536000-memory.dmpFilesize
88KB
-
memory/3840-120-0x0000000000000000-mapping.dmp
-
memory/3840-127-0x0000000000550000-0x000000000069A000-memory.dmpFilesize
1.3MB
-
memory/3840-123-0x00000000006C8000-0x00000000006D1000-memory.dmpFilesize
36KB
-
memory/3872-158-0x0000000002EA0000-0x0000000002EE5000-memory.dmpFilesize
276KB
-
memory/3872-155-0x0000000000000000-mapping.dmp
-
memory/3940-207-0x0000000000000000-mapping.dmp
-
memory/3940-212-0x0000000000D60000-0x0000000000D61000-memory.dmpFilesize
4KB
-
memory/3940-224-0x0000000005790000-0x0000000005791000-memory.dmpFilesize
4KB
-
memory/3996-236-0x0000000000400000-0x0000000000460000-memory.dmpFilesize
384KB
-
memory/3996-228-0x0000000000000000-mapping.dmp