Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-12-2021 09:54
Static task
static1
Behavioral task
behavioral1
Sample
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe
Resource
win10-en-20211208
General
-
Target
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe
-
Size
181KB
-
MD5
3808dc0200721c3bec767cc4bf042d63
-
SHA1
3b1d13422b9559ce49ff27ba29d9890b6e4711e8
-
SHA256
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82
-
SHA512
e1d0d76b6b29cab5c235265bb39a75dfec19891dfacd934fac23a853bdfef665db32eb7926d0059730deec68ccf9f6ba8dc7a72b4e3daf2652ea27be84844f01
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
Extracted
raccoon
1.8.3-hotfix
eab89db8f8e51b4a23c6cffb85db8684a0f53e06
-
url4cnc
http://91.219.236.27/zalmanssx
http://94.158.245.167/zalmanssx
http://185.163.204.216/zalmanssx
http://185.225.19.238/zalmanssx
http://185.163.204.218/zalmanssx
https://t.me/zalmanssx
Extracted
tofsee
mubrikych.top
oxxyfix.xyz
Extracted
amadey
2.86
185.215.113.35/d2VxjasuwS/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-137-0x0000000000890000-0x00000000008F9000-memory.dmp family_redline behavioral1/memory/1096-157-0x0000000000ED0000-0x0000000000FE4000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Arkei Stealer Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-193-0x0000000000980000-0x000000000099C000-memory.dmp family_arkei behavioral1/memory/1640-194-0x0000000000400000-0x0000000000827000-memory.dmp family_arkei -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
1EDE.exe1EDE.exe4DCF.exeAA86.exeB48A.exeD765.exeF6E4.exeF84C.exeAFB.exejjwxsiny.exe3AA7.exetkools.exeD542.exepid process 2820 1EDE.exe 1480 1EDE.exe 2000 4DCF.exe 3012 AA86.exe 1096 B48A.exe 1640 D765.exe 2160 F6E4.exe 3936 F84C.exe 3568 AFB.exe 3056 jjwxsiny.exe 1136 3AA7.exe 3456 tkools.exe 1328 D542.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
F6E4.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion F6E4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion F6E4.exe -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Loads dropped DLL 1 IoCs
Processes:
D765.exepid process 1640 D765.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
F6E4.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA F6E4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
AA86.exeB48A.exeF6E4.exeD542.exepid process 3012 AA86.exe 1096 B48A.exe 2160 F6E4.exe 2160 F6E4.exe 1328 D542.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe1EDE.exejjwxsiny.exedescription pid process target process PID 2576 set thread context of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2820 set thread context of 1480 2820 1EDE.exe 1EDE.exe PID 3056 set thread context of 3976 3056 jjwxsiny.exe svchost.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 896 2160 WerFault.exe F6E4.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe1EDE.exe4DCF.exeF84C.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EDE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EDE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4DCF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4DCF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F84C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1EDE.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4DCF.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F84C.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F84C.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exepid process 512 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 512 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe1EDE.exe4DCF.exeF84C.exepid process 512 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 1480 1EDE.exe 2000 4DCF.exe 3040 3040 3040 3040 3936 F84C.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
AA86.exeB48A.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 3012 AA86.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 1096 B48A.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe1EDE.exeAFB.exedescription pid process target process PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 2576 wrote to memory of 512 2576 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe 794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe PID 3040 wrote to memory of 2820 3040 1EDE.exe PID 3040 wrote to memory of 2820 3040 1EDE.exe PID 3040 wrote to memory of 2820 3040 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 2820 wrote to memory of 1480 2820 1EDE.exe 1EDE.exe PID 3040 wrote to memory of 2000 3040 4DCF.exe PID 3040 wrote to memory of 2000 3040 4DCF.exe PID 3040 wrote to memory of 2000 3040 4DCF.exe PID 3040 wrote to memory of 3012 3040 AA86.exe PID 3040 wrote to memory of 3012 3040 AA86.exe PID 3040 wrote to memory of 3012 3040 AA86.exe PID 3040 wrote to memory of 1096 3040 B48A.exe PID 3040 wrote to memory of 1096 3040 B48A.exe PID 3040 wrote to memory of 1096 3040 B48A.exe PID 3040 wrote to memory of 1640 3040 D765.exe PID 3040 wrote to memory of 1640 3040 D765.exe PID 3040 wrote to memory of 1640 3040 D765.exe PID 3040 wrote to memory of 2160 3040 F6E4.exe PID 3040 wrote to memory of 2160 3040 F6E4.exe PID 3040 wrote to memory of 2160 3040 F6E4.exe PID 3040 wrote to memory of 3936 3040 F84C.exe PID 3040 wrote to memory of 3936 3040 F84C.exe PID 3040 wrote to memory of 3936 3040 F84C.exe PID 3040 wrote to memory of 3568 3040 AFB.exe PID 3040 wrote to memory of 3568 3040 AFB.exe PID 3040 wrote to memory of 3568 3040 AFB.exe PID 3040 wrote to memory of 1800 3040 explorer.exe PID 3040 wrote to memory of 1800 3040 explorer.exe PID 3040 wrote to memory of 1800 3040 explorer.exe PID 3040 wrote to memory of 1800 3040 explorer.exe PID 3040 wrote to memory of 1156 3040 explorer.exe PID 3040 wrote to memory of 1156 3040 explorer.exe PID 3040 wrote to memory of 1156 3040 explorer.exe PID 3568 wrote to memory of 1016 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 1016 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 1016 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 2876 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 2876 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 2876 3568 AFB.exe cmd.exe PID 3568 wrote to memory of 2336 3568 AFB.exe sc.exe PID 3568 wrote to memory of 2336 3568 AFB.exe sc.exe PID 3568 wrote to memory of 2336 3568 AFB.exe sc.exe PID 3568 wrote to memory of 584 3568 AFB.exe sc.exe PID 3568 wrote to memory of 584 3568 AFB.exe sc.exe PID 3568 wrote to memory of 584 3568 AFB.exe sc.exe PID 3568 wrote to memory of 1920 3568 AFB.exe sc.exe PID 3568 wrote to memory of 1920 3568 AFB.exe sc.exe PID 3568 wrote to memory of 1920 3568 AFB.exe sc.exe PID 3568 wrote to memory of 3128 3568 AFB.exe netsh.exe PID 3568 wrote to memory of 3128 3568 AFB.exe netsh.exe PID 3568 wrote to memory of 3128 3568 AFB.exe netsh.exe PID 3040 wrote to memory of 1136 3040 3AA7.exe PID 3040 wrote to memory of 1136 3040 3AA7.exe PID 3040 wrote to memory of 1136 3040 3AA7.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe"C:\Users\Admin\AppData\Local\Temp\794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe"C:\Users\Admin\AppData\Local\Temp\794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1EDE.exeC:\Users\Admin\AppData\Local\Temp\1EDE.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1EDE.exeC:\Users\Admin\AppData\Local\Temp\1EDE.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\4DCF.exeC:\Users\Admin\AppData\Local\Temp\4DCF.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\AA86.exeC:\Users\Admin\AppData\Local\Temp\AA86.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\B48A.exeC:\Users\Admin\AppData\Local\Temp\B48A.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\D765.exeC:\Users\Admin\AppData\Local\Temp\D765.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\F6E4.exeC:\Users\Admin\AppData\Local\Temp\F6E4.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 9242⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\F84C.exeC:\Users\Admin\AppData\Local\Temp\F84C.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\AFB.exeC:\Users\Admin\AppData\Local\Temp\AFB.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\ycohizew\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\jjwxsiny.exe" C:\Windows\SysWOW64\ycohizew\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create ycohizew binPath= "C:\Windows\SysWOW64\ycohizew\jjwxsiny.exe /d\"C:\Users\Admin\AppData\Local\Temp\AFB.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description ycohizew "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start ycohizew2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\ycohizew\jjwxsiny.exeC:\Windows\SysWOW64\ycohizew\jjwxsiny.exe /d"C:\Users\Admin\AppData\Local\Temp\AFB.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\3AA7.exeC:\Users\Admin\AppData\Local\Temp\3AA7.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\3⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\60bb09348e\4⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\D542.exeC:\Users\Admin\AppData\Local\Temp\D542.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Persistence
New Service
1Modify Existing Service
1Registry Run Keys / Startup Folder
1Scheduled Task
1Defense Evasion
Disabling Security Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1EDE.exeMD5
3808dc0200721c3bec767cc4bf042d63
SHA13b1d13422b9559ce49ff27ba29d9890b6e4711e8
SHA256794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82
SHA512e1d0d76b6b29cab5c235265bb39a75dfec19891dfacd934fac23a853bdfef665db32eb7926d0059730deec68ccf9f6ba8dc7a72b4e3daf2652ea27be84844f01
-
C:\Users\Admin\AppData\Local\Temp\1EDE.exeMD5
3808dc0200721c3bec767cc4bf042d63
SHA13b1d13422b9559ce49ff27ba29d9890b6e4711e8
SHA256794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82
SHA512e1d0d76b6b29cab5c235265bb39a75dfec19891dfacd934fac23a853bdfef665db32eb7926d0059730deec68ccf9f6ba8dc7a72b4e3daf2652ea27be84844f01
-
C:\Users\Admin\AppData\Local\Temp\1EDE.exeMD5
3808dc0200721c3bec767cc4bf042d63
SHA13b1d13422b9559ce49ff27ba29d9890b6e4711e8
SHA256794ea810f1ad3843cb55f737e35d7977f34629582f5a6793d7118ab2d362cb82
SHA512e1d0d76b6b29cab5c235265bb39a75dfec19891dfacd934fac23a853bdfef665db32eb7926d0059730deec68ccf9f6ba8dc7a72b4e3daf2652ea27be84844f01
-
C:\Users\Admin\AppData\Local\Temp\3AA7.exeMD5
39fc4991660e9bfaca359d6ce89741f8
SHA14fb157db93c50a099230078d48586e33db249067
SHA2569712448b7d09842ce3f16d74fce76158d597aeeaf24380cc7cdcc3100ee75133
SHA5120c4e7ed79a7fa1c0060e4c23c42354252758aca992d4ded1ec4588a7409923098f0dd96be3121d7bac3cd934dacff9af4add28fa32a988989b2f9cd47c90959e
-
C:\Users\Admin\AppData\Local\Temp\3AA7.exeMD5
39fc4991660e9bfaca359d6ce89741f8
SHA14fb157db93c50a099230078d48586e33db249067
SHA2569712448b7d09842ce3f16d74fce76158d597aeeaf24380cc7cdcc3100ee75133
SHA5120c4e7ed79a7fa1c0060e4c23c42354252758aca992d4ded1ec4588a7409923098f0dd96be3121d7bac3cd934dacff9af4add28fa32a988989b2f9cd47c90959e
-
C:\Users\Admin\AppData\Local\Temp\4DCF.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\4DCF.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
39fc4991660e9bfaca359d6ce89741f8
SHA14fb157db93c50a099230078d48586e33db249067
SHA2569712448b7d09842ce3f16d74fce76158d597aeeaf24380cc7cdcc3100ee75133
SHA5120c4e7ed79a7fa1c0060e4c23c42354252758aca992d4ded1ec4588a7409923098f0dd96be3121d7bac3cd934dacff9af4add28fa32a988989b2f9cd47c90959e
-
C:\Users\Admin\AppData\Local\Temp\60bb09348e\tkools.exeMD5
39fc4991660e9bfaca359d6ce89741f8
SHA14fb157db93c50a099230078d48586e33db249067
SHA2569712448b7d09842ce3f16d74fce76158d597aeeaf24380cc7cdcc3100ee75133
SHA5120c4e7ed79a7fa1c0060e4c23c42354252758aca992d4ded1ec4588a7409923098f0dd96be3121d7bac3cd934dacff9af4add28fa32a988989b2f9cd47c90959e
-
C:\Users\Admin\AppData\Local\Temp\98686542063830006056MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\AA86.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\AA86.exeMD5
0cefed061e2a2241ecd302d7790a2f80
SHA15f119195af2db118c5fbac21634bea00f5d5b8da
SHA256014ad60fd2c294dd8fb63c022961e17df1ba74bb1209a64634112913edc44983
SHA5127b7e4460dad4f176b11a66a37bbc1b2fd2c7e042c5e949c72edcc3c93d9bb9d210d8ecc95d8aad533c761947958e008c4ced8b5faef9319ebb5bf29752381cba
-
C:\Users\Admin\AppData\Local\Temp\AFB.exeMD5
770dfc297b7d93a7b1fec741aa231d0b
SHA1d2e0f002241ffbfc4fe2fa9887f1c36c14507c74
SHA2562b4410287e67430d35c427b31f4768ac8acca9483897ca578a2ae9a7cbbc0ea6
SHA512ad7630373e0cb9f4dd06375aabf1433f22937615c7af2bcd11305e7d112f1c07e0e4557ada55c774e83237af23d457904e72d49685b2a71bcdaed052fb6c7958
-
C:\Users\Admin\AppData\Local\Temp\AFB.exeMD5
770dfc297b7d93a7b1fec741aa231d0b
SHA1d2e0f002241ffbfc4fe2fa9887f1c36c14507c74
SHA2562b4410287e67430d35c427b31f4768ac8acca9483897ca578a2ae9a7cbbc0ea6
SHA512ad7630373e0cb9f4dd06375aabf1433f22937615c7af2bcd11305e7d112f1c07e0e4557ada55c774e83237af23d457904e72d49685b2a71bcdaed052fb6c7958
-
C:\Users\Admin\AppData\Local\Temp\B48A.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\B48A.exeMD5
c5b6dee0bdd57086d955bad03812b71f
SHA1122221b7a9fabf95349e00f00efbdc7ad4662a6d
SHA256b39c858766d31fba41aa2266a4e518446c87e9f724e1092d79a24f009a9ec2ef
SHA5124efe9eb6ac6d7c76289ae27213c3bff156dbb507430e053aa2a676664132f8a9a31ccc19f0da9ad3336e91246e74ff0a99eb8bd98023134f07be59ac92f8c849
-
C:\Users\Admin\AppData\Local\Temp\D542.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\D542.exeMD5
a3fdebc978000f4111270ac5b79f1e07
SHA1e40996eba2206b918f142ee094ac3816fc2fbfed
SHA25698a9fb3ddbb57367b3d5ebe2e1eb725b5a9a30e657605ff1b98a0e765419639d
SHA512a1f9d8b68b7fab4dbcef561eeaf4ffa30cad6df7f38c583307ccb2196207d060ff96f036ec08fc8c3e180b2a43706d4dadc8ada86d3abbfe6468c444004f5301
-
C:\Users\Admin\AppData\Local\Temp\D765.exeMD5
8979c8511540ec9ab3042f279ea8ac43
SHA1056e034c33e35f2d5c7ad8e0d85c26391351bd17
SHA256c626c8f9e32979bb77af3da4dfc5810d51c5ee74ecb2e69742b4284dc2c4c1b0
SHA51203fb0c64bf1ad2a85ea27b97af5e37fd1ec504d6ca45910c049069391129d98353823404fba712fe2317e8b7846a32bdf5b56b24690ba78b84c7b7bf94119e28
-
C:\Users\Admin\AppData\Local\Temp\D765.exeMD5
8979c8511540ec9ab3042f279ea8ac43
SHA1056e034c33e35f2d5c7ad8e0d85c26391351bd17
SHA256c626c8f9e32979bb77af3da4dfc5810d51c5ee74ecb2e69742b4284dc2c4c1b0
SHA51203fb0c64bf1ad2a85ea27b97af5e37fd1ec504d6ca45910c049069391129d98353823404fba712fe2317e8b7846a32bdf5b56b24690ba78b84c7b7bf94119e28
-
C:\Users\Admin\AppData\Local\Temp\F6E4.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\F6E4.exeMD5
fcf030085e86da948a7cca2076687a91
SHA1a9fd9e62e0e4714478dc9b06857f82a4ab0014d2
SHA25667539484b73f85bcedfb8c39d1591e6472546d037ec483a477a7273bae4cb6be
SHA512567ff3b17537573fde2c88265d830743525752f9fe70cc39316947d60a0f980096673bdcf228a30ff886ba52c97ae49d0771f3255ae6f4edfb7e03ce499afbee
-
C:\Users\Admin\AppData\Local\Temp\F84C.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\F84C.exeMD5
65fd5caa0beaf2c6915e5b05004e5ba8
SHA14a1e5e5c188ef1e8a3e5bf7fa7db17f0307c6912
SHA256ef0d3b336aeef7f0a0aeb78ec08f1f20592d8006bcbe3fbb559e18aebcf060a3
SHA512c3dee0f304f45f274e28a737ac11506f99066abae57576f75c1b8151c0c8cee5c9e377ab2bc79929f5cf7f7f0f0b77947e657454daecd0e5fcea998df9c85d11
-
C:\Users\Admin\AppData\Local\Temp\jjwxsiny.exeMD5
500a71381cce9223b71c7726d2678313
SHA1ed6d94da8952d491a09cfd0e7bfc1ea387d0da8e
SHA2562a4d49c256f1ef7571b734966f4cf63b7cb88329b5691b0ee7e4ef913582c5cf
SHA512a72e5a70ecf751294d0cd84cb6caa8d014da9daac7cddfc6ef4ec6b25216eac45c622d25406098b651e71b93f52f8bd2c9c90afea131c9f6c5f6ec1580b96d03
-
C:\Windows\SysWOW64\ycohizew\jjwxsiny.exeMD5
500a71381cce9223b71c7726d2678313
SHA1ed6d94da8952d491a09cfd0e7bfc1ea387d0da8e
SHA2562a4d49c256f1ef7571b734966f4cf63b7cb88329b5691b0ee7e4ef913582c5cf
SHA512a72e5a70ecf751294d0cd84cb6caa8d014da9daac7cddfc6ef4ec6b25216eac45c622d25406098b651e71b93f52f8bd2c9c90afea131c9f6c5f6ec1580b96d03
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/512-118-0x0000000000402F47-mapping.dmp
-
memory/512-117-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/584-237-0x0000000000000000-mapping.dmp
-
memory/1016-233-0x0000000000000000-mapping.dmp
-
memory/1096-158-0x0000000001510000-0x0000000001511000-memory.dmpFilesize
4KB
-
memory/1096-173-0x000000006FC60000-0x000000006FCAB000-memory.dmpFilesize
300KB
-
memory/1096-171-0x0000000005B80000-0x0000000005B81000-memory.dmpFilesize
4KB
-
memory/1096-170-0x0000000074BE0000-0x0000000075F28000-memory.dmpFilesize
19.3MB
-
memory/1096-189-0x00000000080A0000-0x00000000080A1000-memory.dmpFilesize
4KB
-
memory/1096-169-0x0000000073A40000-0x0000000073FC4000-memory.dmpFilesize
5.5MB
-
memory/1096-154-0x0000000000000000-mapping.dmp
-
memory/1096-164-0x0000000071A10000-0x0000000071A90000-memory.dmpFilesize
512KB
-
memory/1096-162-0x0000000000ED0000-0x0000000000ED1000-memory.dmpFilesize
4KB
-
memory/1096-157-0x0000000000ED0000-0x0000000000FE4000-memory.dmpFilesize
1.1MB
-
memory/1096-159-0x0000000003050000-0x0000000003095000-memory.dmpFilesize
276KB
-
memory/1096-161-0x0000000076640000-0x0000000076731000-memory.dmpFilesize
964KB
-
memory/1096-160-0x0000000076830000-0x00000000769F2000-memory.dmpFilesize
1.8MB
-
memory/1136-242-0x0000000000000000-mapping.dmp
-
memory/1136-252-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/1136-250-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/1136-251-0x0000000000840000-0x000000000098A000-memory.dmpFilesize
1.3MB
-
memory/1156-225-0x0000000000000000-mapping.dmp
-
memory/1156-226-0x0000000000A00000-0x0000000000A07000-memory.dmpFilesize
28KB
-
memory/1156-227-0x00000000007F0000-0x00000000007FC000-memory.dmpFilesize
48KB
-
memory/1328-264-0x0000000000000000-mapping.dmp
-
memory/1328-267-0x0000000003080000-0x00000000030C5000-memory.dmpFilesize
276KB
-
memory/1480-124-0x0000000000402F47-mapping.dmp
-
memory/1640-193-0x0000000000980000-0x000000000099C000-memory.dmpFilesize
112KB
-
memory/1640-186-0x0000000000000000-mapping.dmp
-
memory/1640-192-0x00000000001D0000-0x00000000001E1000-memory.dmpFilesize
68KB
-
memory/1640-194-0x0000000000400000-0x0000000000827000-memory.dmpFilesize
4.2MB
-
memory/1800-223-0x0000000002D60000-0x0000000002DD4000-memory.dmpFilesize
464KB
-
memory/1800-224-0x0000000000890000-0x00000000008FB000-memory.dmpFilesize
428KB
-
memory/1800-222-0x0000000000000000-mapping.dmp
-
memory/1920-238-0x0000000000000000-mapping.dmp
-
memory/1992-257-0x0000000000000000-mapping.dmp
-
memory/2000-131-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/2000-127-0x0000000000000000-mapping.dmp
-
memory/2000-130-0x0000000000851000-0x0000000000862000-memory.dmpFilesize
68KB
-
memory/2000-132-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/2160-205-0x0000000000FB0000-0x0000000000FF5000-memory.dmpFilesize
276KB
-
memory/2160-210-0x0000000076830000-0x00000000769F2000-memory.dmpFilesize
1.8MB
-
memory/2160-195-0x0000000000000000-mapping.dmp
-
memory/2160-218-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-202-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-217-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-203-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-204-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-216-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-206-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-208-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-207-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-209-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/2160-199-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-211-0x0000000076640000-0x0000000076731000-memory.dmpFilesize
964KB
-
memory/2160-213-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-212-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2160-214-0x0000000076F00000-0x000000007708E000-memory.dmpFilesize
1.6MB
-
memory/2160-215-0x0000000000340000-0x00000000008A4000-memory.dmpFilesize
5.4MB
-
memory/2336-236-0x0000000000000000-mapping.dmp
-
memory/2576-116-0x0000000000860000-0x0000000000869000-memory.dmpFilesize
36KB
-
memory/2576-115-0x0000000000030000-0x0000000000038000-memory.dmpFilesize
32KB
-
memory/2820-120-0x0000000000000000-mapping.dmp
-
memory/2876-234-0x0000000000000000-mapping.dmp
-
memory/2976-258-0x0000000000000000-mapping.dmp
-
memory/3012-151-0x0000000074BE0000-0x0000000075F28000-memory.dmpFilesize
19.3MB
-
memory/3012-140-0x0000000076640000-0x0000000076731000-memory.dmpFilesize
964KB
-
memory/3012-134-0x0000000000000000-mapping.dmp
-
memory/3012-185-0x0000000007C00000-0x0000000007C01000-memory.dmpFilesize
4KB
-
memory/3012-184-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/3012-178-0x0000000006970000-0x0000000006971000-memory.dmpFilesize
4KB
-
memory/3012-137-0x0000000000890000-0x00000000008F9000-memory.dmpFilesize
420KB
-
memory/3012-138-0x0000000002EF0000-0x0000000002EF1000-memory.dmpFilesize
4KB
-
memory/3012-139-0x0000000076830000-0x00000000769F2000-memory.dmpFilesize
1.8MB
-
memory/3012-141-0x0000000000890000-0x0000000000891000-memory.dmpFilesize
4KB
-
memory/3012-143-0x0000000071A10000-0x0000000071A90000-memory.dmpFilesize
512KB
-
memory/3012-177-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/3012-176-0x00000000068B0000-0x00000000068B1000-memory.dmpFilesize
4KB
-
memory/3012-175-0x0000000006D30000-0x0000000006D31000-memory.dmpFilesize
4KB
-
memory/3012-174-0x0000000005CA0000-0x0000000005CA1000-memory.dmpFilesize
4KB
-
memory/3012-153-0x000000006FC60000-0x000000006FCAB000-memory.dmpFilesize
300KB
-
memory/3012-152-0x00000000059A0000-0x00000000059A1000-memory.dmpFilesize
4KB
-
memory/3012-150-0x0000000073A40000-0x0000000073FC4000-memory.dmpFilesize
5.5MB
-
memory/3012-144-0x0000000006020000-0x0000000006021000-memory.dmpFilesize
4KB
-
memory/3012-145-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/3012-149-0x0000000005A00000-0x0000000005A01000-memory.dmpFilesize
4KB
-
memory/3012-148-0x0000000002F20000-0x0000000002F65000-memory.dmpFilesize
276KB
-
memory/3012-147-0x0000000005960000-0x0000000005961000-memory.dmpFilesize
4KB
-
memory/3012-146-0x0000000005B20000-0x0000000005B21000-memory.dmpFilesize
4KB
-
memory/3040-240-0x0000000004B50000-0x0000000004B66000-memory.dmpFilesize
88KB
-
memory/3040-119-0x0000000000DD0000-0x0000000000DE6000-memory.dmpFilesize
88KB
-
memory/3040-126-0x0000000000FC0000-0x0000000000FD6000-memory.dmpFilesize
88KB
-
memory/3040-133-0x00000000010B0000-0x00000000010C6000-memory.dmpFilesize
88KB
-
memory/3056-249-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/3128-241-0x0000000000000000-mapping.dmp
-
memory/3456-261-0x0000000000CE0000-0x0000000000D18000-memory.dmpFilesize
224KB
-
memory/3456-253-0x0000000000000000-mapping.dmp
-
memory/3456-262-0x0000000000400000-0x0000000000834000-memory.dmpFilesize
4.2MB
-
memory/3456-259-0x0000000000A30000-0x0000000000A4D000-memory.dmpFilesize
116KB
-
memory/3520-260-0x0000000000000000-mapping.dmp
-
memory/3568-231-0x00000000001E0000-0x00000000001F3000-memory.dmpFilesize
76KB
-
memory/3568-219-0x0000000000000000-mapping.dmp
-
memory/3568-230-0x0000000000030000-0x000000000003D000-memory.dmpFilesize
52KB
-
memory/3568-232-0x0000000000400000-0x0000000000824000-memory.dmpFilesize
4.1MB
-
memory/3936-229-0x0000000000400000-0x00000000004CC000-memory.dmpFilesize
816KB
-
memory/3936-228-0x00000000007B1000-0x00000000007C2000-memory.dmpFilesize
68KB
-
memory/3936-198-0x0000000000000000-mapping.dmp
-
memory/3976-246-0x0000000000129A6B-mapping.dmp
-
memory/3976-245-0x0000000000120000-0x0000000000135000-memory.dmpFilesize
84KB
-
memory/3976-248-0x0000000000030000-0x0000000000031000-memory.dmpFilesize
4KB
-
memory/3976-247-0x0000000000030000-0x0000000000031000-memory.dmpFilesize
4KB