Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-12-2021 07:29
Static task
static1
Behavioral task
behavioral1
Sample
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe
Resource
win10-en-20211208
General
-
Target
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe
-
Size
181KB
-
MD5
34c78521d67fb4aa55aeecb68812da05
-
SHA1
22e356f20841f2164c171474fc38fd57149a0267
-
SHA256
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333
-
SHA512
d73ef01a4cc29da6f2c5cf847c18cef56fc5ef1a1f46c9217cce2570f4fed60f35c16a22fa1d82a8cf3948096a37498b1bbe4bc988d08d4e51331bef001e9bb0
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1064-133-0x0000000001080000-0x00000000010E9000-memory.dmp family_redline behavioral1/memory/1020-146-0x0000000001010000-0x0000000001124000-memory.dmp family_redline behavioral1/memory/3944-260-0x0000000000210000-0x0000000000314000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3628 created 3608 3628 WerFault.exe 1143.exe -
suricata: ET MALWARE Amadey CnC Check-In
suricata: ET MALWARE Amadey CnC Check-In
-
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
suricata: ET MALWARE Possible Dridex Download URI Struct with no referer
-
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
suricata: ET MALWARE Sharik/Smoke CnC Beacon 11
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
7636.exeD81D.exeDE39.exeE4A2.exeD81D.exe451.exe8B7.exe1143.exe2876.exeqvrcvxbg.exetkools.exe8CED.exetkools.exepid process 3636 7636.exe 2656 D81D.exe 1064 DE39.exe 1020 E4A2.exe 2336 D81D.exe 2224 451.exe 3148 8B7.exe 3608 1143.exe 2252 2876.exe 1456 qvrcvxbg.exe 1292 tkools.exe 3944 8CED.exe 2384 tkools.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
1143.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1143.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1143.exe -
Deletes itself 1 IoCs
Processes:
pid process 3032 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
1143.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1143.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
DE39.exeE4A2.exe1143.exe8CED.exepid process 1064 DE39.exe 1020 E4A2.exe 3608 1143.exe 3608 1143.exe 3944 8CED.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exeD81D.exeqvrcvxbg.exedescription pid process target process PID 2732 set thread context of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2656 set thread context of 2336 2656 D81D.exe D81D.exe PID 1456 set thread context of 1700 1456 qvrcvxbg.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3628 3608 WerFault.exe 1143.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
D81D.exe451.exe696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe7636.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D81D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 451.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 451.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7636.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7636.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D81D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 7636.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI D81D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 451.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exepid process 3392 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 3392 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe7636.exeD81D.exe451.exepid process 3392 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 3636 7636.exe 2336 D81D.exe 3032 3032 3032 3032 2224 451.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
DE39.exeE4A2.exeWerFault.exe8CED.exedescription pid process Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1064 DE39.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeDebugPrivilege 1020 E4A2.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeRestorePrivilege 3628 WerFault.exe Token: SeBackupPrivilege 3628 WerFault.exe Token: SeDebugPrivilege 3628 WerFault.exe Token: SeDebugPrivilege 3944 8CED.exe Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 Token: SeShutdownPrivilege 3032 Token: SeCreatePagefilePrivilege 3032 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exeD81D.exe8B7.exe2876.exedescription pid process target process PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 2732 wrote to memory of 3392 2732 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe 696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe PID 3032 wrote to memory of 3636 3032 7636.exe PID 3032 wrote to memory of 3636 3032 7636.exe PID 3032 wrote to memory of 3636 3032 7636.exe PID 3032 wrote to memory of 2656 3032 D81D.exe PID 3032 wrote to memory of 2656 3032 D81D.exe PID 3032 wrote to memory of 2656 3032 D81D.exe PID 3032 wrote to memory of 1064 3032 DE39.exe PID 3032 wrote to memory of 1064 3032 DE39.exe PID 3032 wrote to memory of 1064 3032 DE39.exe PID 3032 wrote to memory of 1020 3032 E4A2.exe PID 3032 wrote to memory of 1020 3032 E4A2.exe PID 3032 wrote to memory of 1020 3032 E4A2.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 2656 wrote to memory of 2336 2656 D81D.exe D81D.exe PID 3032 wrote to memory of 2224 3032 451.exe PID 3032 wrote to memory of 2224 3032 451.exe PID 3032 wrote to memory of 2224 3032 451.exe PID 3032 wrote to memory of 3148 3032 8B7.exe PID 3032 wrote to memory of 3148 3032 8B7.exe PID 3032 wrote to memory of 3148 3032 8B7.exe PID 3032 wrote to memory of 3608 3032 1143.exe PID 3032 wrote to memory of 3608 3032 1143.exe PID 3032 wrote to memory of 3608 3032 1143.exe PID 3032 wrote to memory of 3512 3032 explorer.exe PID 3032 wrote to memory of 3512 3032 explorer.exe PID 3032 wrote to memory of 3512 3032 explorer.exe PID 3032 wrote to memory of 3512 3032 explorer.exe PID 3148 wrote to memory of 2052 3148 8B7.exe cmd.exe PID 3148 wrote to memory of 2052 3148 8B7.exe cmd.exe PID 3148 wrote to memory of 2052 3148 8B7.exe cmd.exe PID 3032 wrote to memory of 2252 3032 2876.exe PID 3032 wrote to memory of 2252 3032 2876.exe PID 3032 wrote to memory of 2252 3032 2876.exe PID 3032 wrote to memory of 1788 3032 explorer.exe PID 3032 wrote to memory of 1788 3032 explorer.exe PID 3032 wrote to memory of 1788 3032 explorer.exe PID 3148 wrote to memory of 1128 3148 8B7.exe cmd.exe PID 3148 wrote to memory of 1128 3148 8B7.exe cmd.exe PID 3148 wrote to memory of 1128 3148 8B7.exe cmd.exe PID 3148 wrote to memory of 1016 3148 8B7.exe sc.exe PID 3148 wrote to memory of 1016 3148 8B7.exe sc.exe PID 3148 wrote to memory of 1016 3148 8B7.exe sc.exe PID 3148 wrote to memory of 664 3148 8B7.exe sc.exe PID 3148 wrote to memory of 664 3148 8B7.exe sc.exe PID 3148 wrote to memory of 664 3148 8B7.exe sc.exe PID 3148 wrote to memory of 1236 3148 8B7.exe sc.exe PID 3148 wrote to memory of 1236 3148 8B7.exe sc.exe PID 3148 wrote to memory of 1236 3148 8B7.exe sc.exe PID 3148 wrote to memory of 3132 3148 8B7.exe netsh.exe PID 3148 wrote to memory of 3132 3148 8B7.exe netsh.exe PID 3148 wrote to memory of 3132 3148 8B7.exe netsh.exe PID 2252 wrote to memory of 1292 2252 2876.exe tkools.exe PID 2252 wrote to memory of 1292 2252 2876.exe tkools.exe PID 2252 wrote to memory of 1292 2252 2876.exe tkools.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe"C:\Users\Admin\AppData\Local\Temp\696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe"C:\Users\Admin\AppData\Local\Temp\696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:3392
-
C:\Users\Admin\AppData\Local\Temp\7636.exeC:\Users\Admin\AppData\Local\Temp\7636.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:3636
-
C:\Users\Admin\AppData\Local\Temp\D81D.exeC:\Users\Admin\AppData\Local\Temp\D81D.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\D81D.exeC:\Users\Admin\AppData\Local\Temp\D81D.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2336
-
C:\Users\Admin\AppData\Local\Temp\DE39.exeC:\Users\Admin\AppData\Local\Temp\DE39.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
C:\Users\Admin\AppData\Local\Temp\E4A2.exeC:\Users\Admin\AppData\Local\Temp\E4A2.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
C:\Users\Admin\AppData\Local\Temp\451.exeC:\Users\Admin\AppData\Local\Temp\451.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
PID:2224
-
C:\Users\Admin\AppData\Local\Temp\8B7.exeC:\Users\Admin\AppData\Local\Temp\8B7.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\siqvzsgq\2⤵PID:2052
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\qvrcvxbg.exe" C:\Windows\SysWOW64\siqvzsgq\2⤵PID:1128
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create siqvzsgq binPath= "C:\Windows\SysWOW64\siqvzsgq\qvrcvxbg.exe /d\"C:\Users\Admin\AppData\Local\Temp\8B7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵PID:1016
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description siqvzsgq "wifi internet conection"2⤵PID:664
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start siqvzsgq2⤵PID:1236
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵PID:3132
-
C:\Users\Admin\AppData\Local\Temp\1143.exeC:\Users\Admin\AppData\Local\Temp\1143.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 9522⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
PID:3628
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
PID:3512
-
C:\Users\Admin\AppData\Local\Temp\2876.exeC:\Users\Admin\AppData\Local\Temp\2876.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵PID:2380
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵PID:1104
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
PID:3596
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵PID:1788
-
C:\Windows\SysWOW64\siqvzsgq\qvrcvxbg.exeC:\Windows\SysWOW64\siqvzsgq\qvrcvxbg.exe /d"C:\Users\Admin\AppData\Local\Temp\8B7.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\8CED.exeC:\Users\Admin\AppData\Local\Temp\8CED.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeC:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe1⤵
- Executes dropped EXE
PID:2384
Network
MITRE ATT&CK Enterprise v6
Persistence
Modify Existing Service
1New Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1143.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\1143.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\19850783111134003120MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\19850783111134003120MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\2876.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\2876.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\451.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\451.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
2ef6fe31e93909b0fd17c05b0ed5d7d4
SHA12f7651624c0adb3ae8fda5fb6b5df42423bee38d
SHA256fc60164d3da978e1140d70085a511d9862c946b6a02e9dc4202c8155de14b682
SHA512c5e0771a1ada5ba3149d3c394c576006701ec86f14cb2a91c3b264a00e951fb6c829c22a6daf716ec763ea9c21bbc8ba58dc88131ebac7ca53833871348d409a
-
C:\Users\Admin\AppData\Local\Temp\7636.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\7636.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\8B7.exeMD5
5e99606ef31ac864c982046d8e2c62f5
SHA17a99c5451eed05f363a4d89afe33c9406e155f95
SHA256ee8c0eda3de0ce70a8b133b2c872541fc1d813536667acfd674f1f007365be75
SHA5126aec50f15ef4f00d9f17ca42ef1fbe4e586f4a86e25aa2ae17ac574b8658e3df3796ebbaa2bc7bfc38476c103b715b347a70279264f750a9ffcf82462b712fbf
-
C:\Users\Admin\AppData\Local\Temp\8B7.exeMD5
5e99606ef31ac864c982046d8e2c62f5
SHA17a99c5451eed05f363a4d89afe33c9406e155f95
SHA256ee8c0eda3de0ce70a8b133b2c872541fc1d813536667acfd674f1f007365be75
SHA5126aec50f15ef4f00d9f17ca42ef1fbe4e586f4a86e25aa2ae17ac574b8658e3df3796ebbaa2bc7bfc38476c103b715b347a70279264f750a9ffcf82462b712fbf
-
C:\Users\Admin\AppData\Local\Temp\8CED.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\8CED.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\D81D.exeMD5
34c78521d67fb4aa55aeecb68812da05
SHA122e356f20841f2164c171474fc38fd57149a0267
SHA256696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333
SHA512d73ef01a4cc29da6f2c5cf847c18cef56fc5ef1a1f46c9217cce2570f4fed60f35c16a22fa1d82a8cf3948096a37498b1bbe4bc988d08d4e51331bef001e9bb0
-
C:\Users\Admin\AppData\Local\Temp\D81D.exeMD5
34c78521d67fb4aa55aeecb68812da05
SHA122e356f20841f2164c171474fc38fd57149a0267
SHA256696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333
SHA512d73ef01a4cc29da6f2c5cf847c18cef56fc5ef1a1f46c9217cce2570f4fed60f35c16a22fa1d82a8cf3948096a37498b1bbe4bc988d08d4e51331bef001e9bb0
-
C:\Users\Admin\AppData\Local\Temp\D81D.exeMD5
34c78521d67fb4aa55aeecb68812da05
SHA122e356f20841f2164c171474fc38fd57149a0267
SHA256696d66c7e61171cab95ac684060c60d4384acc55f38bb4599a990da27d337333
SHA512d73ef01a4cc29da6f2c5cf847c18cef56fc5ef1a1f46c9217cce2570f4fed60f35c16a22fa1d82a8cf3948096a37498b1bbe4bc988d08d4e51331bef001e9bb0
-
C:\Users\Admin\AppData\Local\Temp\DE39.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\DE39.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\E4A2.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\E4A2.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Windows\SysWOW64\siqvzsgq\qvrcvxbg.exeMD5
4c515eb1d8bf518ef980989b87c526a0
SHA12b99cc7b0aff6e0047e327e064b819ee54d05861
SHA256f08b3dbd6176326d2119549c322e0b37e6e9969e99162e4752576cde846cb560
SHA5122b4dc21e2331da5432f19a1b42bbd4c308a9ab37acac3d9b4b9f83a460fec55ff77a0bb6a546541eed314be2cf7b0f609d5f36e1794bf86dfa2e79062f41a3dc
-
C:\Windows\SysWOW64\siqvzsgq\qvrcvxbg.exeMD5
4c515eb1d8bf518ef980989b87c526a0
SHA12b99cc7b0aff6e0047e327e064b819ee54d05861
SHA256f08b3dbd6176326d2119549c322e0b37e6e9969e99162e4752576cde846cb560
SHA5122b4dc21e2331da5432f19a1b42bbd4c308a9ab37acac3d9b4b9f83a460fec55ff77a0bb6a546541eed314be2cf7b0f609d5f36e1794bf86dfa2e79062f41a3dc
-
memory/664-228-0x0000000000000000-mapping.dmp
-
memory/1016-224-0x0000000000000000-mapping.dmp
-
memory/1020-153-0x0000000072050000-0x00000000720D0000-memory.dmpFilesize
512KB
-
memory/1020-189-0x0000000005AA0000-0x0000000005AA1000-memory.dmpFilesize
4KB
-
memory/1020-148-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/1020-146-0x0000000001010000-0x0000000001124000-memory.dmpFilesize
1.1MB
-
memory/1020-151-0x0000000001010000-0x0000000001011000-memory.dmpFilesize
4KB
-
memory/1020-150-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/1020-223-0x0000000006AB0000-0x0000000006AB1000-memory.dmpFilesize
4KB
-
memory/1020-142-0x0000000000000000-mapping.dmp
-
memory/1020-171-0x0000000074050000-0x000000007409B000-memory.dmpFilesize
300KB
-
memory/1020-155-0x0000000001490000-0x00000000014D5000-memory.dmpFilesize
276KB
-
memory/1020-159-0x0000000005780000-0x0000000005781000-memory.dmpFilesize
4KB
-
memory/1020-169-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/1020-161-0x0000000076EB0000-0x0000000077434000-memory.dmpFilesize
5.5MB
-
memory/1020-165-0x0000000002E80000-0x0000000002E81000-memory.dmpFilesize
4KB
-
memory/1020-163-0x0000000074320000-0x0000000075668000-memory.dmpFilesize
19.3MB
-
memory/1020-147-0x0000000001230000-0x0000000001231000-memory.dmpFilesize
4KB
-
memory/1064-134-0x0000000001060000-0x0000000001061000-memory.dmpFilesize
4KB
-
memory/1064-135-0x0000000001200000-0x000000000134A000-memory.dmpFilesize
1.3MB
-
memory/1064-162-0x0000000076EB0000-0x0000000077434000-memory.dmpFilesize
5.5MB
-
memory/1064-157-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/1064-172-0x0000000074050000-0x000000007409B000-memory.dmpFilesize
300KB
-
memory/1064-140-0x0000000072050000-0x00000000720D0000-memory.dmpFilesize
512KB
-
memory/1064-133-0x0000000001080000-0x00000000010E9000-memory.dmpFilesize
420KB
-
memory/1064-141-0x0000000005E40000-0x0000000005E41000-memory.dmpFilesize
4KB
-
memory/1064-197-0x0000000005BD0000-0x0000000005BD1000-memory.dmpFilesize
4KB
-
memory/1064-145-0x00000000056E0000-0x00000000056E1000-memory.dmpFilesize
4KB
-
memory/1064-193-0x0000000005AB0000-0x0000000005AB1000-memory.dmpFilesize
4KB
-
memory/1064-164-0x0000000074320000-0x0000000075668000-memory.dmpFilesize
19.3MB
-
memory/1064-136-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/1064-137-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/1064-235-0x0000000007140000-0x0000000007141000-memory.dmpFilesize
4KB
-
memory/1064-198-0x0000000005BB0000-0x0000000005BB1000-memory.dmpFilesize
4KB
-
memory/1064-138-0x0000000001080000-0x0000000001081000-memory.dmpFilesize
4KB
-
memory/1064-149-0x0000000005830000-0x0000000005831000-memory.dmpFilesize
4KB
-
memory/1064-130-0x0000000000000000-mapping.dmp
-
memory/1064-187-0x0000000006950000-0x0000000006951000-memory.dmpFilesize
4KB
-
memory/1064-236-0x0000000007840000-0x0000000007841000-memory.dmpFilesize
4KB
-
memory/1104-254-0x0000000000000000-mapping.dmp
-
memory/1128-221-0x0000000000000000-mapping.dmp
-
memory/1236-231-0x0000000000000000-mapping.dmp
-
memory/1292-256-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/1292-237-0x0000000000000000-mapping.dmp
-
memory/1292-255-0x0000000000840000-0x0000000000878000-memory.dmpFilesize
224KB
-
memory/1456-248-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/1456-247-0x0000000000830000-0x000000000097A000-memory.dmpFilesize
1.3MB
-
memory/1700-244-0x0000000002DC9A6B-mapping.dmp
-
memory/1700-243-0x0000000002DC0000-0x0000000002DD5000-memory.dmpFilesize
84KB
-
memory/1700-245-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1700-246-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1788-216-0x0000000000000000-mapping.dmp
-
memory/1788-220-0x00000000005E0000-0x00000000005EC000-memory.dmpFilesize
48KB
-
memory/1788-219-0x00000000005F0000-0x00000000005F7000-memory.dmpFilesize
28KB
-
memory/2052-212-0x0000000000000000-mapping.dmp
-
memory/2224-203-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/2224-173-0x0000000000000000-mapping.dmp
-
memory/2252-213-0x0000000000000000-mapping.dmp
-
memory/2252-242-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/2252-240-0x00000000001C0000-0x00000000001DD000-memory.dmpFilesize
116KB
-
memory/2252-241-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/2336-167-0x0000000000402F47-mapping.dmp
-
memory/2380-252-0x0000000000000000-mapping.dmp
-
memory/2384-288-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/2384-287-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/2656-127-0x0000000000000000-mapping.dmp
-
memory/2732-116-0x0000000000930000-0x0000000000939000-memory.dmpFilesize
36KB
-
memory/2732-115-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/3032-230-0x0000000005910000-0x0000000005926000-memory.dmpFilesize
88KB
-
memory/3032-176-0x0000000004E20000-0x0000000004E36000-memory.dmpFilesize
88KB
-
memory/3032-119-0x0000000001050000-0x0000000001066000-memory.dmpFilesize
88KB
-
memory/3032-126-0x0000000002E10000-0x0000000002E26000-memory.dmpFilesize
88KB
-
memory/3132-234-0x0000000000000000-mapping.dmp
-
memory/3148-206-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/3148-207-0x0000000000960000-0x0000000000AAA000-memory.dmpFilesize
1.3MB
-
memory/3148-177-0x0000000000000000-mapping.dmp
-
memory/3148-209-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/3392-118-0x0000000000402F47-mapping.dmp
-
memory/3392-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3512-217-0x0000000002B50000-0x0000000002BC4000-memory.dmpFilesize
464KB
-
memory/3512-218-0x0000000002AE0000-0x0000000002B4B000-memory.dmpFilesize
428KB
-
memory/3512-205-0x0000000000000000-mapping.dmp
-
memory/3596-253-0x0000000000000000-mapping.dmp
-
memory/3608-191-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-195-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/3608-200-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-186-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-185-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-183-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-184-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-180-0x0000000000000000-mapping.dmp
-
memory/3608-188-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-190-0x00000000029B0000-0x00000000029F5000-memory.dmpFilesize
276KB
-
memory/3608-199-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-229-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-194-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-222-0x00000000775E0000-0x000000007776E000-memory.dmpFilesize
1.6MB
-
memory/3608-227-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-196-0x00000000760F0000-0x00000000761E1000-memory.dmpFilesize
964KB
-
memory/3608-226-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3608-192-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/3608-225-0x0000000000DA0000-0x0000000001304000-memory.dmpFilesize
5.4MB
-
memory/3636-124-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/3636-120-0x0000000000000000-mapping.dmp
-
memory/3636-125-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3944-260-0x0000000000210000-0x0000000000314000-memory.dmpFilesize
1.0MB
-
memory/3944-261-0x0000000000CF0000-0x0000000000CF1000-memory.dmpFilesize
4KB
-
memory/3944-262-0x0000000075A90000-0x0000000075C52000-memory.dmpFilesize
1.8MB
-
memory/3944-271-0x00000000027A0000-0x00000000027E5000-memory.dmpFilesize
276KB
-
memory/3944-273-0x00000000030B0000-0x00000000030B1000-memory.dmpFilesize
4KB
-
memory/3944-257-0x0000000000000000-mapping.dmp