Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-12-2021 04:22
Static task
static1
Behavioral task
behavioral1
Sample
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe
Resource
win10-en-20211208
General
-
Target
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe
-
Size
182KB
-
MD5
efab989c21328266b0616762a32aa534
-
SHA1
25df0554efeb46a84b013a91e7beaf6f8f93f98c
-
SHA256
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f
-
SHA512
4575ce5e67f203acd46b26745219a5a9297c8ba464b9af306209ece50d20e6418e5b44d35b2a1376e47c35607c69694fb9c08058ed5ec6ef93ffdf2aac893822
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2908-133-0x0000000000F70000-0x0000000000FD9000-memory.dmp family_redline behavioral1/memory/396-150-0x0000000000BC0000-0x0000000000CD4000-memory.dmp family_redline behavioral1/memory/2784-266-0x0000000000B30000-0x0000000000C34000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2400 created 2860 2400 WerFault.exe D497.exe -
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1148-193-0x00000000001E0000-0x00000000001FC000-memory.dmp family_arkei behavioral1/memory/1148-194-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
28D1.exe917F.exe97C9.exe9CDB.exe917F.exeB6EC.exeD497.exeDA45.exeE448.exe6D5.exevrzxkiho.exetkools.exe6F45.exetkools.exepid process 3500 28D1.exe 3436 917F.exe 2908 97C9.exe 396 9CDB.exe 872 917F.exe 1148 B6EC.exe 2860 D497.exe 2760 DA45.exe 3416 E448.exe 2764 6D5.exe 660 vrzxkiho.exe 2508 tkools.exe 2784 6F45.exe 2828 tkools.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
D497.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion D497.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion D497.exe -
Deletes itself 1 IoCs
Processes:
pid process 2892 -
Loads dropped DLL 1 IoCs
Processes:
B6EC.exepid process 1148 B6EC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
D497.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA D497.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
97C9.exe9CDB.exeD497.exe6F45.exepid process 2908 97C9.exe 396 9CDB.exe 2860 D497.exe 2860 D497.exe 2784 6F45.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe917F.exevrzxkiho.exedescription pid process target process PID 2756 set thread context of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 3436 set thread context of 872 3436 917F.exe 917F.exe PID 660 set thread context of 2016 660 vrzxkiho.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2400 2860 WerFault.exe D497.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exeDA45.exe917F.exe28D1.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA45.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917F.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 917F.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI DA45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28D1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28D1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 28D1.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exepid process 760 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe 760 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 2892 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2892 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe28D1.exe917F.exeDA45.exepid process 760 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe 3500 28D1.exe 872 917F.exe 2892 2892 2892 2892 2760 DA45.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
97C9.exe9CDB.exeWerFault.exe6F45.exedescription pid process Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeDebugPrivilege 2908 97C9.exe Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeDebugPrivilege 396 9CDB.exe Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeRestorePrivilege 2400 WerFault.exe Token: SeBackupPrivilege 2400 WerFault.exe Token: SeDebugPrivilege 2400 WerFault.exe Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 Token: SeDebugPrivilege 2784 6F45.exe Token: SeShutdownPrivilege 2892 Token: SeCreatePagefilePrivilege 2892 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe917F.exeE448.exedescription pid process target process PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2756 wrote to memory of 760 2756 fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe PID 2892 wrote to memory of 3500 2892 28D1.exe PID 2892 wrote to memory of 3500 2892 28D1.exe PID 2892 wrote to memory of 3500 2892 28D1.exe PID 2892 wrote to memory of 3436 2892 917F.exe PID 2892 wrote to memory of 3436 2892 917F.exe PID 2892 wrote to memory of 3436 2892 917F.exe PID 2892 wrote to memory of 2908 2892 97C9.exe PID 2892 wrote to memory of 2908 2892 97C9.exe PID 2892 wrote to memory of 2908 2892 97C9.exe PID 2892 wrote to memory of 396 2892 9CDB.exe PID 2892 wrote to memory of 396 2892 9CDB.exe PID 2892 wrote to memory of 396 2892 9CDB.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 3436 wrote to memory of 872 3436 917F.exe 917F.exe PID 2892 wrote to memory of 1148 2892 B6EC.exe PID 2892 wrote to memory of 1148 2892 B6EC.exe PID 2892 wrote to memory of 1148 2892 B6EC.exe PID 2892 wrote to memory of 2860 2892 D497.exe PID 2892 wrote to memory of 2860 2892 D497.exe PID 2892 wrote to memory of 2860 2892 D497.exe PID 2892 wrote to memory of 2760 2892 DA45.exe PID 2892 wrote to memory of 2760 2892 DA45.exe PID 2892 wrote to memory of 2760 2892 DA45.exe PID 2892 wrote to memory of 3416 2892 E448.exe PID 2892 wrote to memory of 3416 2892 E448.exe PID 2892 wrote to memory of 3416 2892 E448.exe PID 2892 wrote to memory of 3748 2892 explorer.exe PID 2892 wrote to memory of 3748 2892 explorer.exe PID 2892 wrote to memory of 3748 2892 explorer.exe PID 2892 wrote to memory of 3748 2892 explorer.exe PID 2892 wrote to memory of 348 2892 explorer.exe PID 2892 wrote to memory of 348 2892 explorer.exe PID 2892 wrote to memory of 348 2892 explorer.exe PID 3416 wrote to memory of 2244 3416 E448.exe cmd.exe PID 3416 wrote to memory of 2244 3416 E448.exe cmd.exe PID 3416 wrote to memory of 2244 3416 E448.exe cmd.exe PID 3416 wrote to memory of 1220 3416 E448.exe cmd.exe PID 3416 wrote to memory of 1220 3416 E448.exe cmd.exe PID 3416 wrote to memory of 1220 3416 E448.exe cmd.exe PID 3416 wrote to memory of 1764 3416 E448.exe sc.exe PID 3416 wrote to memory of 1764 3416 E448.exe sc.exe PID 3416 wrote to memory of 1764 3416 E448.exe sc.exe PID 3416 wrote to memory of 1932 3416 E448.exe sc.exe PID 3416 wrote to memory of 1932 3416 E448.exe sc.exe PID 3416 wrote to memory of 1932 3416 E448.exe sc.exe PID 2892 wrote to memory of 2764 2892 6D5.exe PID 2892 wrote to memory of 2764 2892 6D5.exe PID 2892 wrote to memory of 2764 2892 6D5.exe PID 3416 wrote to memory of 2916 3416 E448.exe sc.exe PID 3416 wrote to memory of 2916 3416 E448.exe sc.exe PID 3416 wrote to memory of 2916 3416 E448.exe sc.exe PID 3416 wrote to memory of 2980 3416 E448.exe netsh.exe PID 3416 wrote to memory of 2980 3416 E448.exe netsh.exe PID 3416 wrote to memory of 2980 3416 E448.exe netsh.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe"C:\Users\Admin\AppData\Local\Temp\fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe"C:\Users\Admin\AppData\Local\Temp\fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\28D1.exeC:\Users\Admin\AppData\Local\Temp\28D1.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\917F.exeC:\Users\Admin\AppData\Local\Temp\917F.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\917F.exeC:\Users\Admin\AppData\Local\Temp\917F.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\97C9.exeC:\Users\Admin\AppData\Local\Temp\97C9.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\9CDB.exeC:\Users\Admin\AppData\Local\Temp\9CDB.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\B6EC.exeC:\Users\Admin\AppData\Local\Temp\B6EC.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\D497.exeC:\Users\Admin\AppData\Local\Temp\D497.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 10042⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\DA45.exeC:\Users\Admin\AppData\Local\Temp\DA45.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\E448.exeC:\Users\Admin\AppData\Local\Temp\E448.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\gfbimdwt\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\vrzxkiho.exe" C:\Windows\SysWOW64\gfbimdwt\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create gfbimdwt binPath= "C:\Windows\SysWOW64\gfbimdwt\vrzxkiho.exe /d\"C:\Users\Admin\AppData\Local\Temp\E448.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description gfbimdwt "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start gfbimdwt2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\6D5.exeC:\Users\Admin\AppData\Local\Temp\6D5.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\gfbimdwt\vrzxkiho.exeC:\Windows\SysWOW64\gfbimdwt\vrzxkiho.exe /d"C:\Users\Admin\AppData\Local\Temp\E448.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\6F45.exeC:\Users\Admin\AppData\Local\Temp\6F45.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeC:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\28D1.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\28D1.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\6D5.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\6D5.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\6F45.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\6F45.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\917F.exeMD5
efab989c21328266b0616762a32aa534
SHA125df0554efeb46a84b013a91e7beaf6f8f93f98c
SHA256fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f
SHA5124575ce5e67f203acd46b26745219a5a9297c8ba464b9af306209ece50d20e6418e5b44d35b2a1376e47c35607c69694fb9c08058ed5ec6ef93ffdf2aac893822
-
C:\Users\Admin\AppData\Local\Temp\917F.exeMD5
efab989c21328266b0616762a32aa534
SHA125df0554efeb46a84b013a91e7beaf6f8f93f98c
SHA256fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f
SHA5124575ce5e67f203acd46b26745219a5a9297c8ba464b9af306209ece50d20e6418e5b44d35b2a1376e47c35607c69694fb9c08058ed5ec6ef93ffdf2aac893822
-
C:\Users\Admin\AppData\Local\Temp\917F.exeMD5
efab989c21328266b0616762a32aa534
SHA125df0554efeb46a84b013a91e7beaf6f8f93f98c
SHA256fe29f225c4ad3a71ecd30d00600f853f581ca8cf0b9944ba10e1630c8904087f
SHA5124575ce5e67f203acd46b26745219a5a9297c8ba464b9af306209ece50d20e6418e5b44d35b2a1376e47c35607c69694fb9c08058ed5ec6ef93ffdf2aac893822
-
C:\Users\Admin\AppData\Local\Temp\97C9.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\97C9.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\98686542063830006056MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\9CDB.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\9CDB.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\B6EC.exeMD5
c28e41e782b04253f116e393be306e25
SHA13d2e513735cb0f508f53bb45b3007f537428af08
SHA256ceea9f0222833d1bc893cb27442e9951e60b6d004e200da319dce16b72847d58
SHA5123bd61ace7fca0adaa1051a39b47fbf60e84a4b959578c1f7178b94b6019ec8c79968d24330c0085bbb977ebfef20136e04db289eee15966eca778147dea033f1
-
C:\Users\Admin\AppData\Local\Temp\B6EC.exeMD5
c28e41e782b04253f116e393be306e25
SHA13d2e513735cb0f508f53bb45b3007f537428af08
SHA256ceea9f0222833d1bc893cb27442e9951e60b6d004e200da319dce16b72847d58
SHA5123bd61ace7fca0adaa1051a39b47fbf60e84a4b959578c1f7178b94b6019ec8c79968d24330c0085bbb977ebfef20136e04db289eee15966eca778147dea033f1
-
C:\Users\Admin\AppData\Local\Temp\D497.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\D497.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\DA45.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\DA45.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\E448.exeMD5
a84635b5c36d1edec196e145b4ce1112
SHA1f8e564d6c4f113dc2f2c8b837b4e8a521192269c
SHA256e5735565f66cd6ea7dd8450f4d5c1f50148def2c35ba1bf01bf2d7aacfaf0caa
SHA51228288f595d8cf9987970069218c9cb4bf38bf226820ad522fb14733d74e9cc24ec2470279eb16d3622072db23362ec67368bd4125d24bf27a063a6c8146ea277
-
C:\Users\Admin\AppData\Local\Temp\E448.exeMD5
a84635b5c36d1edec196e145b4ce1112
SHA1f8e564d6c4f113dc2f2c8b837b4e8a521192269c
SHA256e5735565f66cd6ea7dd8450f4d5c1f50148def2c35ba1bf01bf2d7aacfaf0caa
SHA51228288f595d8cf9987970069218c9cb4bf38bf226820ad522fb14733d74e9cc24ec2470279eb16d3622072db23362ec67368bd4125d24bf27a063a6c8146ea277
-
C:\Users\Admin\AppData\Local\Temp\vrzxkiho.exeMD5
49439314856652cac1f00776ea2d728f
SHA12f7468525292f8d155b6be44dd2f843c35cd64c8
SHA256222986c2328e257d7082a097d5a5e9241e00071c70f95d5732bc931ba5786a5e
SHA5124e0e3b4da6a37077a22d1325074c1db073630d21447adfbbbe196abb41d33409b2bfaeb6b4f1efc48bba07fb4e85578b8c4e63085b3ca4c4522b0a5a6c59ebc1
-
C:\Windows\SysWOW64\gfbimdwt\vrzxkiho.exeMD5
49439314856652cac1f00776ea2d728f
SHA12f7468525292f8d155b6be44dd2f843c35cd64c8
SHA256222986c2328e257d7082a097d5a5e9241e00071c70f95d5732bc931ba5786a5e
SHA5124e0e3b4da6a37077a22d1325074c1db073630d21447adfbbbe196abb41d33409b2bfaeb6b4f1efc48bba07fb4e85578b8c4e63085b3ca4c4522b0a5a6c59ebc1
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/348-228-0x00000000009A0000-0x00000000009AC000-memory.dmpFilesize
48KB
-
memory/348-226-0x00000000009B0000-0x00000000009B7000-memory.dmpFilesize
28KB
-
memory/348-223-0x0000000000000000-mapping.dmp
-
memory/396-153-0x0000000075280000-0x0000000075371000-memory.dmpFilesize
964KB
-
memory/396-169-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/396-150-0x0000000000BC0000-0x0000000000CD4000-memory.dmpFilesize
1.1MB
-
memory/396-151-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/396-152-0x0000000074900000-0x0000000074AC2000-memory.dmpFilesize
1.8MB
-
memory/396-155-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB
-
memory/396-156-0x0000000002820000-0x0000000002865000-memory.dmpFilesize
276KB
-
memory/396-168-0x000000006FE00000-0x000000006FE4B000-memory.dmpFilesize
300KB
-
memory/396-145-0x0000000000000000-mapping.dmp
-
memory/396-158-0x0000000071BB0000-0x0000000071C30000-memory.dmpFilesize
512KB
-
memory/396-191-0x0000000007310000-0x0000000007311000-memory.dmpFilesize
4KB
-
memory/396-166-0x0000000075D90000-0x00000000770D8000-memory.dmpFilesize
19.3MB
-
memory/396-165-0x0000000075380000-0x0000000075904000-memory.dmpFilesize
5.5MB
-
memory/660-255-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/720-259-0x0000000000000000-mapping.dmp
-
memory/760-118-0x0000000000402F47-mapping.dmp
-
memory/760-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/872-171-0x0000000000402F47-mapping.dmp
-
memory/1148-192-0x00000000001C0000-0x00000000001D1000-memory.dmpFilesize
68KB
-
memory/1148-194-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1148-173-0x0000000000000000-mapping.dmp
-
memory/1148-193-0x00000000001E0000-0x00000000001FC000-memory.dmpFilesize
112KB
-
memory/1220-231-0x0000000000000000-mapping.dmp
-
memory/1764-236-0x0000000000000000-mapping.dmp
-
memory/1932-237-0x0000000000000000-mapping.dmp
-
memory/2016-254-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2016-251-0x0000000000650000-0x0000000000665000-memory.dmpFilesize
84KB
-
memory/2016-252-0x0000000000659A6B-mapping.dmp
-
memory/2016-253-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2244-230-0x0000000000000000-mapping.dmp
-
memory/2508-262-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/2508-261-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/2508-245-0x0000000000000000-mapping.dmp
-
memory/2756-116-0x00000000001C0000-0x00000000001C9000-memory.dmpFilesize
36KB
-
memory/2756-115-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/2760-229-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/2760-227-0x0000000000741000-0x0000000000752000-memory.dmpFilesize
68KB
-
memory/2760-208-0x0000000000000000-mapping.dmp
-
memory/2764-246-0x00000000001C0000-0x00000000001DD000-memory.dmpFilesize
116KB
-
memory/2764-247-0x0000000000840000-0x0000000000878000-memory.dmpFilesize
224KB
-
memory/2764-238-0x0000000000000000-mapping.dmp
-
memory/2764-250-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/2784-263-0x0000000000000000-mapping.dmp
-
memory/2784-266-0x0000000000B30000-0x0000000000C34000-memory.dmpFilesize
1.0MB
-
memory/2784-279-0x0000000002CA0000-0x0000000002CE5000-memory.dmpFilesize
276KB
-
memory/2784-281-0x0000000005810000-0x0000000005811000-memory.dmpFilesize
4KB
-
memory/2860-205-0x0000000074900000-0x0000000074AC2000-memory.dmpFilesize
1.8MB
-
memory/2860-198-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-204-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/2860-212-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-209-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-214-0x0000000077140000-0x00000000772CE000-memory.dmpFilesize
1.6MB
-
memory/2860-213-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-207-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-215-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-216-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-217-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-202-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-219-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-199-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-206-0x0000000075280000-0x0000000075371000-memory.dmpFilesize
964KB
-
memory/2860-195-0x0000000000000000-mapping.dmp
-
memory/2860-203-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2860-200-0x0000000002730000-0x0000000002775000-memory.dmpFilesize
276KB
-
memory/2860-201-0x00000000001D0000-0x0000000000734000-memory.dmpFilesize
5.4MB
-
memory/2872-260-0x0000000000000000-mapping.dmp
-
memory/2892-126-0x00000000030F0000-0x0000000003106000-memory.dmpFilesize
88KB
-
memory/2892-243-0x0000000005D10000-0x0000000005D26000-memory.dmpFilesize
88KB
-
memory/2892-190-0x0000000004C30000-0x0000000004C46000-memory.dmpFilesize
88KB
-
memory/2892-119-0x00000000013C0000-0x00000000013D6000-memory.dmpFilesize
88KB
-
memory/2908-159-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/2908-180-0x0000000006AA0000-0x0000000006AA1000-memory.dmpFilesize
4KB
-
memory/2908-176-0x0000000006B30000-0x0000000006B31000-memory.dmpFilesize
4KB
-
memory/2908-143-0x0000000005A10000-0x0000000005A11000-memory.dmpFilesize
4KB
-
memory/2908-136-0x0000000075280000-0x0000000075371000-memory.dmpFilesize
964KB
-
memory/2908-137-0x0000000000F70000-0x0000000000F71000-memory.dmpFilesize
4KB
-
memory/2908-178-0x0000000006730000-0x0000000006731000-memory.dmpFilesize
4KB
-
memory/2908-139-0x0000000071BB0000-0x0000000071C30000-memory.dmpFilesize
512KB
-
memory/2908-135-0x0000000074900000-0x0000000074AC2000-memory.dmpFilesize
1.8MB
-
memory/2908-134-0x0000000000FF0000-0x0000000000FF1000-memory.dmpFilesize
4KB
-
memory/2908-258-0x0000000000000000-mapping.dmp
-
memory/2908-133-0x0000000000F70000-0x0000000000FD9000-memory.dmpFilesize
420KB
-
memory/2908-140-0x0000000006020000-0x0000000006021000-memory.dmpFilesize
4KB
-
memory/2908-144-0x00000000058F0000-0x00000000058F1000-memory.dmpFilesize
4KB
-
memory/2908-179-0x00000000067B0000-0x00000000067B1000-memory.dmpFilesize
4KB
-
memory/2908-177-0x0000000005C50000-0x0000000005C51000-memory.dmpFilesize
4KB
-
memory/2908-141-0x00000000013E0000-0x0000000001425000-memory.dmpFilesize
276KB
-
memory/2908-130-0x0000000000000000-mapping.dmp
-
memory/2908-149-0x0000000075D90000-0x00000000770D8000-memory.dmpFilesize
19.3MB
-
memory/2908-182-0x0000000007A00000-0x0000000007A01000-memory.dmpFilesize
4KB
-
memory/2908-161-0x000000006FE00000-0x000000006FE4B000-memory.dmpFilesize
300KB
-
memory/2908-181-0x0000000007300000-0x0000000007301000-memory.dmpFilesize
4KB
-
memory/2908-146-0x0000000075380000-0x0000000075904000-memory.dmpFilesize
5.5MB
-
memory/2908-154-0x0000000005A00000-0x0000000005A01000-memory.dmpFilesize
4KB
-
memory/2908-142-0x0000000005890000-0x0000000005891000-memory.dmpFilesize
4KB
-
memory/2916-241-0x0000000000000000-mapping.dmp
-
memory/2980-244-0x0000000000000000-mapping.dmp
-
memory/3416-233-0x00000000001C0000-0x00000000001D3000-memory.dmpFilesize
76KB
-
memory/3416-218-0x0000000000000000-mapping.dmp
-
memory/3416-234-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/3416-232-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/3436-127-0x0000000000000000-mapping.dmp
-
memory/3500-123-0x0000000000711000-0x0000000000722000-memory.dmpFilesize
68KB
-
memory/3500-120-0x0000000000000000-mapping.dmp
-
memory/3500-125-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3500-124-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/3748-222-0x0000000000000000-mapping.dmp
-
memory/3748-224-0x00000000007E0000-0x0000000000854000-memory.dmpFilesize
464KB
-
memory/3748-225-0x0000000000770000-0x00000000007DB000-memory.dmpFilesize
428KB