Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-12-2021 00:55
Static task
static1
Behavioral task
behavioral1
Sample
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe
Resource
win10-en-20211208
General
-
Target
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe
-
Size
182KB
-
MD5
21cb15342fa9711544ce1100cd66e0a8
-
SHA1
7224a42e80a6f9967d10f4ed0c1a2f216465fee7
-
SHA256
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4
-
SHA512
7d3ac8787ef36a9ab22a25d020bb1aa28bf97eda421f6db5027e12a808453f888674e5fa5fcc2e75c6b882e869db1e45e70786b82dedeb83bc0ccd803ecdc844
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1588-133-0x00000000012E0000-0x0000000001349000-memory.dmp family_redline behavioral1/memory/2416-141-0x0000000000DE0000-0x0000000000EF4000-memory.dmp family_redline behavioral1/memory/4004-266-0x00000000009E0000-0x0000000000AE4000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 860 created 3388 860 WerFault.exe DC19.exe -
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1204-178-0x00000000001E0000-0x00000000001FC000-memory.dmp family_arkei behavioral1/memory/1204-179-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
3BCC.exe9D27.exeA537.exeAA0A.exe9D27.exeC1BA.exeDC19.exeE5ED.exeF0CC.exeggtupfkv.exe16E3.exetkools.exe8770.exetkools.exepid process 4004 3BCC.exe 1772 9D27.exe 1588 A537.exe 2416 AA0A.exe 1440 9D27.exe 1204 C1BA.exe 3388 DC19.exe 3200 E5ED.exe 1768 F0CC.exe 2248 ggtupfkv.exe 3960 16E3.exe 800 tkools.exe 4004 8770.exe 3944 tkools.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
DC19.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DC19.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DC19.exe -
Deletes itself 1 IoCs
Processes:
pid process 2984 -
Loads dropped DLL 3 IoCs
Processes:
C1BA.exepid process 1204 C1BA.exe 1204 C1BA.exe 1204 C1BA.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
DC19.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DC19.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
A537.exeAA0A.exeDC19.exe8770.exepid process 1588 A537.exe 2416 AA0A.exe 3388 DC19.exe 3388 DC19.exe 4004 8770.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe9D27.exeggtupfkv.exedescription pid process target process PID 3732 set thread context of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 1772 set thread context of 1440 1772 9D27.exe 9D27.exe PID 2248 set thread context of 3836 2248 ggtupfkv.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 860 3388 WerFault.exe DC19.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
9D27.exeE5ED.exe66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe3BCC.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9D27.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9D27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E5ED.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E5ED.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3BCC.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3BCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 3BCC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 9D27.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI E5ED.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
C1BA.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C1BA.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C1BA.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2248 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exepid process 3448 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 3448 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 2984 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2984 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe3BCC.exe9D27.exeE5ED.exepid process 3448 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 4004 3BCC.exe 1440 9D27.exe 2984 2984 2984 2984 3200 E5ED.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
A537.exeAA0A.exeWerFault.exe8770.exedescription pid process Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 1588 A537.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 2416 AA0A.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeRestorePrivilege 860 WerFault.exe Token: SeBackupPrivilege 860 WerFault.exe Token: SeDebugPrivilege 860 WerFault.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeDebugPrivilege 4004 8770.exe Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 Token: SeShutdownPrivilege 2984 Token: SeCreatePagefilePrivilege 2984 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe9D27.exeF0CC.exedescription pid process target process PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 3732 wrote to memory of 3448 3732 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe 66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe PID 2984 wrote to memory of 4004 2984 3BCC.exe PID 2984 wrote to memory of 4004 2984 3BCC.exe PID 2984 wrote to memory of 4004 2984 3BCC.exe PID 2984 wrote to memory of 1772 2984 9D27.exe PID 2984 wrote to memory of 1772 2984 9D27.exe PID 2984 wrote to memory of 1772 2984 9D27.exe PID 2984 wrote to memory of 1588 2984 A537.exe PID 2984 wrote to memory of 1588 2984 A537.exe PID 2984 wrote to memory of 1588 2984 A537.exe PID 2984 wrote to memory of 2416 2984 AA0A.exe PID 2984 wrote to memory of 2416 2984 AA0A.exe PID 2984 wrote to memory of 2416 2984 AA0A.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 1772 wrote to memory of 1440 1772 9D27.exe 9D27.exe PID 2984 wrote to memory of 1204 2984 C1BA.exe PID 2984 wrote to memory of 1204 2984 C1BA.exe PID 2984 wrote to memory of 1204 2984 C1BA.exe PID 2984 wrote to memory of 3388 2984 DC19.exe PID 2984 wrote to memory of 3388 2984 DC19.exe PID 2984 wrote to memory of 3388 2984 DC19.exe PID 2984 wrote to memory of 3200 2984 E5ED.exe PID 2984 wrote to memory of 3200 2984 E5ED.exe PID 2984 wrote to memory of 3200 2984 E5ED.exe PID 2984 wrote to memory of 3712 2984 explorer.exe PID 2984 wrote to memory of 3712 2984 explorer.exe PID 2984 wrote to memory of 3712 2984 explorer.exe PID 2984 wrote to memory of 3712 2984 explorer.exe PID 2984 wrote to memory of 1768 2984 F0CC.exe PID 2984 wrote to memory of 1768 2984 F0CC.exe PID 2984 wrote to memory of 1768 2984 F0CC.exe PID 2984 wrote to memory of 3812 2984 explorer.exe PID 2984 wrote to memory of 3812 2984 explorer.exe PID 2984 wrote to memory of 3812 2984 explorer.exe PID 1768 wrote to memory of 3708 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 3708 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 3708 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 4004 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 4004 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 4004 1768 F0CC.exe cmd.exe PID 1768 wrote to memory of 1584 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 1584 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 1584 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 1244 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 1244 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 1244 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 3872 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 3872 1768 F0CC.exe sc.exe PID 1768 wrote to memory of 3872 1768 F0CC.exe sc.exe PID 2984 wrote to memory of 3960 2984 16E3.exe PID 2984 wrote to memory of 3960 2984 16E3.exe PID 2984 wrote to memory of 3960 2984 16E3.exe PID 1768 wrote to memory of 2168 1768 F0CC.exe netsh.exe PID 1768 wrote to memory of 2168 1768 F0CC.exe netsh.exe PID 1768 wrote to memory of 2168 1768 F0CC.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe"C:\Users\Admin\AppData\Local\Temp\66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe"C:\Users\Admin\AppData\Local\Temp\66fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3BCC.exeC:\Users\Admin\AppData\Local\Temp\3BCC.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\9D27.exeC:\Users\Admin\AppData\Local\Temp\9D27.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9D27.exeC:\Users\Admin\AppData\Local\Temp\9D27.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\A537.exeC:\Users\Admin\AppData\Local\Temp\A537.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\AA0A.exeC:\Users\Admin\AppData\Local\Temp\AA0A.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\C1BA.exeC:\Users\Admin\AppData\Local\Temp\C1BA.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\C1BA.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\DC19.exeC:\Users\Admin\AppData\Local\Temp\DC19.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 10042⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\E5ED.exeC:\Users\Admin\AppData\Local\Temp\E5ED.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Users\Admin\AppData\Local\Temp\F0CC.exeC:\Users\Admin\AppData\Local\Temp\F0CC.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\isxbfeve\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\ggtupfkv.exe" C:\Windows\SysWOW64\isxbfeve\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create isxbfeve binPath= "C:\Windows\SysWOW64\isxbfeve\ggtupfkv.exe /d\"C:\Users\Admin\AppData\Local\Temp\F0CC.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description isxbfeve "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start isxbfeve2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\isxbfeve\ggtupfkv.exeC:\Windows\SysWOW64\isxbfeve\ggtupfkv.exe /d"C:\Users\Admin\AppData\Local\Temp\F0CC.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\16E3.exeC:\Users\Admin\AppData\Local\Temp\16E3.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8770.exeC:\Users\Admin\AppData\Local\Temp\8770.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeC:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\16E3.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\16E3.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\19850783111134003120MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\19850783111134003120MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\3BCC.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\3BCC.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\8770.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\8770.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\9D27.exeMD5
21cb15342fa9711544ce1100cd66e0a8
SHA17224a42e80a6f9967d10f4ed0c1a2f216465fee7
SHA25666fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4
SHA5127d3ac8787ef36a9ab22a25d020bb1aa28bf97eda421f6db5027e12a808453f888674e5fa5fcc2e75c6b882e869db1e45e70786b82dedeb83bc0ccd803ecdc844
-
C:\Users\Admin\AppData\Local\Temp\9D27.exeMD5
21cb15342fa9711544ce1100cd66e0a8
SHA17224a42e80a6f9967d10f4ed0c1a2f216465fee7
SHA25666fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4
SHA5127d3ac8787ef36a9ab22a25d020bb1aa28bf97eda421f6db5027e12a808453f888674e5fa5fcc2e75c6b882e869db1e45e70786b82dedeb83bc0ccd803ecdc844
-
C:\Users\Admin\AppData\Local\Temp\9D27.exeMD5
21cb15342fa9711544ce1100cd66e0a8
SHA17224a42e80a6f9967d10f4ed0c1a2f216465fee7
SHA25666fc5a4217c5d13eabe0853f2ec4d8d2e99b1228de9e34b82ed409fb480cffb4
SHA5127d3ac8787ef36a9ab22a25d020bb1aa28bf97eda421f6db5027e12a808453f888674e5fa5fcc2e75c6b882e869db1e45e70786b82dedeb83bc0ccd803ecdc844
-
C:\Users\Admin\AppData\Local\Temp\A537.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\A537.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\AA0A.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\AA0A.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\C1BA.exeMD5
cd66fb247248512c271a25cddb4cc885
SHA1f6bbc22c35f710239a5252ca107a15d7c67dff7a
SHA256bec9094215881d2ea4640d469fafa25341244f7137c7dc00c254038fedd01c6f
SHA512953d77a2e651aea98dc51414d7c99e396d673b58ad7e69ff4ee52d0e471aa8ca2d4b650c3e9fd6bd3071959764f9a06daaf42a4fab087f73aefe47fa176771eb
-
C:\Users\Admin\AppData\Local\Temp\C1BA.exeMD5
cd66fb247248512c271a25cddb4cc885
SHA1f6bbc22c35f710239a5252ca107a15d7c67dff7a
SHA256bec9094215881d2ea4640d469fafa25341244f7137c7dc00c254038fedd01c6f
SHA512953d77a2e651aea98dc51414d7c99e396d673b58ad7e69ff4ee52d0e471aa8ca2d4b650c3e9fd6bd3071959764f9a06daaf42a4fab087f73aefe47fa176771eb
-
C:\Users\Admin\AppData\Local\Temp\DC19.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\DC19.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\E5ED.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\E5ED.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\F0CC.exeMD5
b3ef98fda2e640096129fc6ad04e0ce5
SHA134af9ccfb7c06a73bb8591ee06b48b876b97d331
SHA256a1ee67fcfdca0d22485576308611e2107d51b69b5114328c70b86554e9a4f924
SHA512e8b8df75a6cedec9d1de6e1e7d3cfc40819e4a5bbb867eaec9d45f216ae7f5f8baff84f709e598f7233ec1c0aa63283d06b7f679227bfb403c3f74a323579c2f
-
C:\Users\Admin\AppData\Local\Temp\F0CC.exeMD5
b3ef98fda2e640096129fc6ad04e0ce5
SHA134af9ccfb7c06a73bb8591ee06b48b876b97d331
SHA256a1ee67fcfdca0d22485576308611e2107d51b69b5114328c70b86554e9a4f924
SHA512e8b8df75a6cedec9d1de6e1e7d3cfc40819e4a5bbb867eaec9d45f216ae7f5f8baff84f709e598f7233ec1c0aa63283d06b7f679227bfb403c3f74a323579c2f
-
C:\Users\Admin\AppData\Local\Temp\ggtupfkv.exeMD5
a3c02bfdee604d544a9db5e5bcaaa150
SHA10607af701efc6e59297a328960a942f4058ddc69
SHA2566c26b8f8dabf3b2781de3a4b510b2963218de5472113baff036dd11d33e2b2c6
SHA5120bde72a58aa3486c20eae664d0aa1d6513a50f42dff4093d2cd12d76f8a4c251c57910615c202f52bef186e6851daa2a6491a8f24962b14572a21eb58ed0c305
-
C:\Windows\SysWOW64\isxbfeve\ggtupfkv.exeMD5
a3c02bfdee604d544a9db5e5bcaaa150
SHA10607af701efc6e59297a328960a942f4058ddc69
SHA2566c26b8f8dabf3b2781de3a4b510b2963218de5472113baff036dd11d33e2b2c6
SHA5120bde72a58aa3486c20eae664d0aa1d6513a50f42dff4093d2cd12d76f8a4c251c57910615c202f52bef186e6851daa2a6491a8f24962b14572a21eb58ed0c305
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/800-260-0x0000000000A40000-0x0000000000A78000-memory.dmpFilesize
224KB
-
memory/800-249-0x0000000000000000-mapping.dmp
-
memory/800-261-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/1204-179-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1204-178-0x00000000001E0000-0x00000000001FC000-memory.dmpFilesize
112KB
-
memory/1204-177-0x00000000001C0000-0x00000000001D1000-memory.dmpFilesize
68KB
-
memory/1204-173-0x0000000000000000-mapping.dmp
-
memory/1244-235-0x0000000000000000-mapping.dmp
-
memory/1360-259-0x0000000000000000-mapping.dmp
-
memory/1440-161-0x0000000000402F47-mapping.dmp
-
memory/1584-234-0x0000000000000000-mapping.dmp
-
memory/1588-158-0x0000000002BD0000-0x0000000002BD1000-memory.dmpFilesize
4KB
-
memory/1588-136-0x00000000745B0000-0x0000000074772000-memory.dmpFilesize
1.8MB
-
memory/1588-167-0x00000000760D0000-0x0000000077418000-memory.dmpFilesize
19.3MB
-
memory/1588-214-0x0000000006DF0000-0x0000000006DF1000-memory.dmpFilesize
4KB
-
memory/1588-169-0x0000000004C40000-0x0000000004C41000-memory.dmpFilesize
4KB
-
memory/1588-172-0x00000000744D0000-0x000000007451B000-memory.dmpFilesize
300KB
-
memory/1588-133-0x00000000012E0000-0x0000000001349000-memory.dmpFilesize
420KB
-
memory/1588-211-0x00000000066F0000-0x00000000066F1000-memory.dmpFilesize
4KB
-
memory/1588-164-0x0000000074F60000-0x00000000754E4000-memory.dmpFilesize
5.5MB
-
memory/1588-165-0x0000000000F50000-0x0000000000F51000-memory.dmpFilesize
4KB
-
memory/1588-147-0x00000000724D0000-0x0000000072550000-memory.dmpFilesize
512KB
-
memory/1588-204-0x0000000005E50000-0x0000000005E51000-memory.dmpFilesize
4KB
-
memory/1588-143-0x00000000012E0000-0x00000000012E1000-memory.dmpFilesize
4KB
-
memory/1588-153-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/1588-130-0x0000000000000000-mapping.dmp
-
memory/1588-152-0x0000000005250000-0x0000000005251000-memory.dmpFilesize
4KB
-
memory/1588-140-0x00000000777C0000-0x00000000778B1000-memory.dmpFilesize
964KB
-
memory/1588-182-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/1588-134-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/1588-135-0x0000000000940000-0x0000000000985000-memory.dmpFilesize
276KB
-
memory/1768-231-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/1768-218-0x0000000000000000-mapping.dmp
-
memory/1768-230-0x00000000001D0000-0x00000000001E3000-memory.dmpFilesize
76KB
-
memory/1768-229-0x00000000001C0000-0x00000000001CD000-memory.dmpFilesize
52KB
-
memory/1772-127-0x0000000000000000-mapping.dmp
-
memory/1916-297-0x0000000000000000-mapping.dmp
-
memory/1920-262-0x0000000000000000-mapping.dmp
-
memory/2168-243-0x0000000000000000-mapping.dmp
-
memory/2248-252-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/2248-298-0x0000000000000000-mapping.dmp
-
memory/2416-163-0x0000000074F60000-0x00000000754E4000-memory.dmpFilesize
5.5MB
-
memory/2416-137-0x0000000000000000-mapping.dmp
-
memory/2416-171-0x00000000744D0000-0x000000007451B000-memory.dmpFilesize
300KB
-
memory/2416-146-0x00000000745B0000-0x0000000074772000-memory.dmpFilesize
1.8MB
-
memory/2416-145-0x0000000000D90000-0x0000000000DD5000-memory.dmpFilesize
276KB
-
memory/2416-193-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/2416-156-0x0000000004FF0000-0x0000000004FF1000-memory.dmpFilesize
4KB
-
memory/2416-166-0x0000000004ED0000-0x0000000004ED1000-memory.dmpFilesize
4KB
-
memory/2416-191-0x0000000006000000-0x0000000006001000-memory.dmpFilesize
4KB
-
memory/2416-149-0x0000000000DE0000-0x0000000000DE1000-memory.dmpFilesize
4KB
-
memory/2416-142-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/2416-141-0x0000000000DE0000-0x0000000000EF4000-memory.dmpFilesize
1.1MB
-
memory/2416-199-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/2416-168-0x00000000760D0000-0x0000000077418000-memory.dmpFilesize
19.3MB
-
memory/2416-215-0x0000000005F90000-0x0000000005F91000-memory.dmpFilesize
4KB
-
memory/2416-151-0x00000000724D0000-0x0000000072550000-memory.dmpFilesize
512KB
-
memory/2416-148-0x00000000777C0000-0x00000000778B1000-memory.dmpFilesize
964KB
-
memory/2984-176-0x00000000030B0000-0x00000000030C6000-memory.dmpFilesize
88KB
-
memory/2984-126-0x00000000027C0000-0x00000000027D6000-memory.dmpFilesize
88KB
-
memory/2984-119-0x0000000000E60000-0x0000000000E76000-memory.dmpFilesize
88KB
-
memory/2984-244-0x0000000004F40000-0x0000000004F56000-memory.dmpFilesize
88KB
-
memory/3200-210-0x0000000000000000-mapping.dmp
-
memory/3200-227-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3388-188-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-202-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-196-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-180-0x0000000000000000-mapping.dmp
-
memory/3388-216-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-208-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-207-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-184-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-206-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-189-0x0000000001220000-0x0000000001221000-memory.dmpFilesize
4KB
-
memory/3388-201-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-185-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-186-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-198-0x0000000077A60000-0x0000000077BEE000-memory.dmpFilesize
1.6MB
-
memory/3388-187-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-195-0x0000000000800000-0x0000000000D64000-memory.dmpFilesize
5.4MB
-
memory/3388-194-0x00000000011D0000-0x000000000127E000-memory.dmpFilesize
696KB
-
memory/3388-192-0x00000000777C0000-0x00000000778B1000-memory.dmpFilesize
964KB
-
memory/3388-190-0x00000000745B0000-0x0000000074772000-memory.dmpFilesize
1.8MB
-
memory/3448-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3448-116-0x0000000000402F47-mapping.dmp
-
memory/3708-228-0x0000000000000000-mapping.dmp
-
memory/3712-223-0x0000000000C00000-0x0000000000C6B000-memory.dmpFilesize
428KB
-
memory/3712-222-0x0000000000C70000-0x0000000000CE4000-memory.dmpFilesize
464KB
-
memory/3712-217-0x0000000000000000-mapping.dmp
-
memory/3732-118-0x00000000001C0000-0x00000000001C9000-memory.dmpFilesize
36KB
-
memory/3732-117-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/3812-224-0x00000000004E0000-0x00000000004E7000-memory.dmpFilesize
28KB
-
memory/3812-225-0x00000000004D0000-0x00000000004DC000-memory.dmpFilesize
48KB
-
memory/3812-221-0x0000000000000000-mapping.dmp
-
memory/3836-245-0x0000000000730000-0x0000000000745000-memory.dmpFilesize
84KB
-
memory/3836-248-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/3836-247-0x0000000000640000-0x0000000000641000-memory.dmpFilesize
4KB
-
memory/3836-246-0x0000000000739A6B-mapping.dmp
-
memory/3872-238-0x0000000000000000-mapping.dmp
-
memory/3944-294-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/3944-293-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/3948-258-0x0000000000000000-mapping.dmp
-
memory/3960-255-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/3960-253-0x00000000001C0000-0x00000000001DD000-memory.dmpFilesize
116KB
-
memory/3960-254-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/3960-240-0x0000000000000000-mapping.dmp
-
memory/4004-124-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/4004-276-0x0000000000980000-0x00000000009C5000-memory.dmpFilesize
276KB
-
memory/4004-278-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/4004-268-0x00000000745B0000-0x0000000074772000-memory.dmpFilesize
1.8MB
-
memory/4004-267-0x0000000000690000-0x0000000000691000-memory.dmpFilesize
4KB
-
memory/4004-266-0x00000000009E0000-0x0000000000AE4000-memory.dmpFilesize
1.0MB
-
memory/4004-120-0x0000000000000000-mapping.dmp
-
memory/4004-232-0x0000000000000000-mapping.dmp
-
memory/4004-125-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/4004-263-0x0000000000000000-mapping.dmp