Analysis
-
max time kernel
136s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-12-2021 02:44
Static task
static1
Behavioral task
behavioral1
Sample
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe
Resource
win10-en-20211208
General
-
Target
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe
-
Size
787KB
-
MD5
a048419bbecd8baf3e9620c51a19dcb0
-
SHA1
468c3e429b559aebb2046a8f3367ea4e52e4d30a
-
SHA256
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b
-
SHA512
32facaca25a760af3ecdfabf561e50f8631a079ea7411484bd7565c64ea1f0b3f87060c05ff1d8535d77b726658f62ae098d622e7318b7d76929f67cc268f7a6
Malware Config
Extracted
amadey
3.01
exxxodusdomen.hk/f83jd823S/index.php
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2340-115-0x0000000000240000-0x00000000002E5000-memory.dmp family_redline behavioral1/memory/2340-116-0x0000000000240000-0x00000000002E5000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
Processes:
am.exeet.exek.exetkools.exeservices32.exesihost32.exek.exetkools.exeet.exeservices32.exesihost32.exetkools.exepid process 2836 am.exe 3988 et.exe 1316 k.exe 504 tkools.exe 1272 services32.exe 2800 sihost32.exe 644 k.exe 788 tkools.exe 2944 et.exe 908 services32.exe 2968 sihost32.exe 4016 tkools.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
k.exetkools.exek.exetkools.exeam.exetkools.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tkools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion k.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tkools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tkools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion am.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion am.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion tkools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tkools.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion tkools.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\am.exe themida C:\Users\Admin\AppData\Local\Temp\am.exe themida C:\Users\Admin\AppData\Local\Temp\k.exe themida C:\Users\Admin\AppData\Local\Temp\k.exe themida behavioral1/memory/1316-157-0x0000000001350000-0x0000000001351000-memory.dmp themida behavioral1/memory/2836-167-0x00000000010B0000-0x0000000001974000-memory.dmp themida behavioral1/memory/2836-170-0x00000000010B0000-0x0000000001974000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe themida C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe themida behavioral1/memory/504-202-0x0000000001310000-0x0000000001BD4000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\1000002001\k.exe themida C:\Users\Admin\AppData\Local\Temp\1000002001\k.exe themida C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe themida C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
tkools.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run tkools.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\k.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000002001\\k.exe" tkools.exe Set value (str) \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows\CurrentVersion\Run\et.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000009001\\et.exe" tkools.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
k.exetkools.exetkools.exeam.exek.exetkools.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA k.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tkools.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tkools.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA am.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA k.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tkools.exe -
Drops file in System32 directory 5 IoCs
Processes:
et.exeservices32.exeet.exeservices32.exedescription ioc process File opened for modification C:\Windows\system32\services32.exe et.exe File opened for modification C:\Windows\system32\Microsoft\Telemetry\sihost32.exe services32.exe File created C:\Windows\system32\services32.exe et.exe File opened for modification C:\Windows\system32\services32.exe et.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe services32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exeam.exek.exetkools.exek.exetkools.exetkools.exepid process 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe 2836 am.exe 1316 k.exe 504 tkools.exe 644 k.exe 788 tkools.exe 4016 tkools.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 4084 schtasks.exe 3848 schtasks.exe 2452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exeet.exepowershell.exepowershell.exeservices32.exepowershell.exepowershell.exeet.exepowershell.exepowershell.exeservices32.exepowershell.exepowershell.exepid process 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe 3988 et.exe 644 powershell.exe 644 powershell.exe 644 powershell.exe 584 powershell.exe 584 powershell.exe 584 powershell.exe 1272 services32.exe 1272 services32.exe 3080 powershell.exe 3080 powershell.exe 3080 powershell.exe 3380 powershell.exe 3380 powershell.exe 3380 powershell.exe 2944 et.exe 1120 powershell.exe 1120 powershell.exe 1120 powershell.exe 1344 powershell.exe 1344 powershell.exe 1344 powershell.exe 908 services32.exe 908 services32.exe 2372 powershell.exe 2372 powershell.exe 2372 powershell.exe 3204 powershell.exe 3204 powershell.exe 3204 powershell.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
k.exepid process 644 k.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exeet.exepowershell.exepowershell.exeservices32.exepowershell.exedescription pid process Token: SeDebugPrivilege 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe Token: SeDebugPrivilege 3988 et.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeIncreaseQuotaPrivilege 644 powershell.exe Token: SeSecurityPrivilege 644 powershell.exe Token: SeTakeOwnershipPrivilege 644 powershell.exe Token: SeLoadDriverPrivilege 644 powershell.exe Token: SeSystemProfilePrivilege 644 powershell.exe Token: SeSystemtimePrivilege 644 powershell.exe Token: SeProfSingleProcessPrivilege 644 powershell.exe Token: SeIncBasePriorityPrivilege 644 powershell.exe Token: SeCreatePagefilePrivilege 644 powershell.exe Token: SeBackupPrivilege 644 powershell.exe Token: SeRestorePrivilege 644 powershell.exe Token: SeShutdownPrivilege 644 powershell.exe Token: SeDebugPrivilege 644 powershell.exe Token: SeSystemEnvironmentPrivilege 644 powershell.exe Token: SeRemoteShutdownPrivilege 644 powershell.exe Token: SeUndockPrivilege 644 powershell.exe Token: SeManageVolumePrivilege 644 powershell.exe Token: 33 644 powershell.exe Token: 34 644 powershell.exe Token: 35 644 powershell.exe Token: 36 644 powershell.exe Token: SeDebugPrivilege 584 powershell.exe Token: SeIncreaseQuotaPrivilege 584 powershell.exe Token: SeSecurityPrivilege 584 powershell.exe Token: SeTakeOwnershipPrivilege 584 powershell.exe Token: SeLoadDriverPrivilege 584 powershell.exe Token: SeSystemProfilePrivilege 584 powershell.exe Token: SeSystemtimePrivilege 584 powershell.exe Token: SeProfSingleProcessPrivilege 584 powershell.exe Token: SeIncBasePriorityPrivilege 584 powershell.exe Token: SeCreatePagefilePrivilege 584 powershell.exe Token: SeBackupPrivilege 584 powershell.exe Token: SeRestorePrivilege 584 powershell.exe Token: SeShutdownPrivilege 584 powershell.exe Token: SeDebugPrivilege 584 powershell.exe Token: SeSystemEnvironmentPrivilege 584 powershell.exe Token: SeRemoteShutdownPrivilege 584 powershell.exe Token: SeUndockPrivilege 584 powershell.exe Token: SeManageVolumePrivilege 584 powershell.exe Token: 33 584 powershell.exe Token: 34 584 powershell.exe Token: 35 584 powershell.exe Token: 36 584 powershell.exe Token: SeDebugPrivilege 1272 services32.exe Token: SeDebugPrivilege 3080 powershell.exe Token: SeIncreaseQuotaPrivilege 3080 powershell.exe Token: SeSecurityPrivilege 3080 powershell.exe Token: SeTakeOwnershipPrivilege 3080 powershell.exe Token: SeLoadDriverPrivilege 3080 powershell.exe Token: SeSystemProfilePrivilege 3080 powershell.exe Token: SeSystemtimePrivilege 3080 powershell.exe Token: SeProfSingleProcessPrivilege 3080 powershell.exe Token: SeIncBasePriorityPrivilege 3080 powershell.exe Token: SeCreatePagefilePrivilege 3080 powershell.exe Token: SeBackupPrivilege 3080 powershell.exe Token: SeRestorePrivilege 3080 powershell.exe Token: SeShutdownPrivilege 3080 powershell.exe Token: SeDebugPrivilege 3080 powershell.exe Token: SeSystemEnvironmentPrivilege 3080 powershell.exe Token: SeRemoteShutdownPrivilege 3080 powershell.exe Token: SeUndockPrivilege 3080 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exeet.execmd.execmd.exeam.exetkools.execmd.execmd.exeservices32.execmd.exeet.execmd.execmd.execmd.exeservices32.execmd.exedescription pid process target process PID 2340 wrote to memory of 2836 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe am.exe PID 2340 wrote to memory of 2836 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe am.exe PID 2340 wrote to memory of 2836 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe am.exe PID 2340 wrote to memory of 3988 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe et.exe PID 2340 wrote to memory of 3988 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe et.exe PID 2340 wrote to memory of 1316 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe k.exe PID 2340 wrote to memory of 1316 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe k.exe PID 2340 wrote to memory of 1316 2340 bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe k.exe PID 3988 wrote to memory of 3252 3988 et.exe cmd.exe PID 3988 wrote to memory of 3252 3988 et.exe cmd.exe PID 3252 wrote to memory of 644 3252 cmd.exe powershell.exe PID 3252 wrote to memory of 644 3252 cmd.exe powershell.exe PID 3988 wrote to memory of 860 3988 et.exe cmd.exe PID 3988 wrote to memory of 860 3988 et.exe cmd.exe PID 860 wrote to memory of 4084 860 cmd.exe schtasks.exe PID 860 wrote to memory of 4084 860 cmd.exe schtasks.exe PID 2836 wrote to memory of 504 2836 am.exe tkools.exe PID 2836 wrote to memory of 504 2836 am.exe tkools.exe PID 2836 wrote to memory of 504 2836 am.exe tkools.exe PID 504 wrote to memory of 2876 504 tkools.exe cmd.exe PID 504 wrote to memory of 2876 504 tkools.exe cmd.exe PID 504 wrote to memory of 2876 504 tkools.exe cmd.exe PID 504 wrote to memory of 3848 504 tkools.exe schtasks.exe PID 504 wrote to memory of 3848 504 tkools.exe schtasks.exe PID 504 wrote to memory of 3848 504 tkools.exe schtasks.exe PID 2876 wrote to memory of 1064 2876 cmd.exe reg.exe PID 2876 wrote to memory of 1064 2876 cmd.exe reg.exe PID 2876 wrote to memory of 1064 2876 cmd.exe reg.exe PID 3252 wrote to memory of 584 3252 cmd.exe powershell.exe PID 3252 wrote to memory of 584 3252 cmd.exe powershell.exe PID 3988 wrote to memory of 1592 3988 et.exe cmd.exe PID 3988 wrote to memory of 1592 3988 et.exe cmd.exe PID 1592 wrote to memory of 1272 1592 cmd.exe services32.exe PID 1592 wrote to memory of 1272 1592 cmd.exe services32.exe PID 1272 wrote to memory of 984 1272 services32.exe cmd.exe PID 1272 wrote to memory of 984 1272 services32.exe cmd.exe PID 984 wrote to memory of 3080 984 cmd.exe powershell.exe PID 984 wrote to memory of 3080 984 cmd.exe powershell.exe PID 1272 wrote to memory of 2800 1272 services32.exe sihost32.exe PID 1272 wrote to memory of 2800 1272 services32.exe sihost32.exe PID 984 wrote to memory of 3380 984 cmd.exe powershell.exe PID 984 wrote to memory of 3380 984 cmd.exe powershell.exe PID 504 wrote to memory of 644 504 tkools.exe k.exe PID 504 wrote to memory of 644 504 tkools.exe k.exe PID 504 wrote to memory of 644 504 tkools.exe k.exe PID 504 wrote to memory of 2944 504 tkools.exe et.exe PID 504 wrote to memory of 2944 504 tkools.exe et.exe PID 2944 wrote to memory of 3652 2944 et.exe cmd.exe PID 2944 wrote to memory of 3652 2944 et.exe cmd.exe PID 3652 wrote to memory of 1120 3652 cmd.exe powershell.exe PID 3652 wrote to memory of 1120 3652 cmd.exe powershell.exe PID 2944 wrote to memory of 2752 2944 et.exe cmd.exe PID 2944 wrote to memory of 2752 2944 et.exe cmd.exe PID 2752 wrote to memory of 2452 2752 cmd.exe schtasks.exe PID 2752 wrote to memory of 2452 2752 cmd.exe schtasks.exe PID 3652 wrote to memory of 1344 3652 cmd.exe powershell.exe PID 3652 wrote to memory of 1344 3652 cmd.exe powershell.exe PID 2944 wrote to memory of 3452 2944 et.exe cmd.exe PID 2944 wrote to memory of 3452 2944 et.exe cmd.exe PID 3452 wrote to memory of 908 3452 cmd.exe services32.exe PID 3452 wrote to memory of 908 3452 cmd.exe services32.exe PID 908 wrote to memory of 2276 908 services32.exe cmd.exe PID 908 wrote to memory of 2276 908 services32.exe cmd.exe PID 2276 wrote to memory of 2372 2276 cmd.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe"C:\Users\Admin\AppData\Local\Temp\bc568026a968ebfed5e7fc53d59e57f36925ee31670480b466bdc4f9dc38c39b.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\am.exe"C:\Users\Admin\AppData\Local\Temp\am.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe"C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\91a0189a82\4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\91a0189a82\5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN tkools.exe /TR "C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000002001\k.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\k.exe"4⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: SetClipboardViewer
-
C:\Users\Admin\AppData\Local\Temp\1000009001\et.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\et.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"6⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Windows\system32\services32.exe"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\services32.exeC:\Windows\system32\services32.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"8⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"8⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\et.exe"C:\Users\Admin\AppData\Local\Temp\et.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\cmd.exe"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr "C:\Windows\system32\services32.exe"4⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\cmd.exe"cmd" cmd /c "C:\Windows\system32\services32.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\services32.exeC:\Windows\system32\services32.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\k.exe"C:\Users\Admin\AppData\Local\Temp\k.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeC:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeC:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\et.exe.logMD5
84f2160705ac9a032c002f966498ef74
SHA1e9f3db2e1ad24a4f7e5c203af03bbc07235e704c
SHA2567840ca7ea27e8a24ebc4877774be6013ab4f81d1eb83c121e4c3290ceb532d93
SHA512f41c289770d8817ee612e53880d3f6492d50d08fb5104bf76440c2a93539dd25f6f15179b318e67b9202aabbe802941f80ac2dbadfd6ff1081b0d37c33f9da57
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logMD5
ad5cd538ca58cb28ede39c108acb5785
SHA11ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\services32.exe.logMD5
1340455a637fc44dc74dcda441d71018
SHA184277aa9596ccaacd2b7d72a3fbcef70de91dbd3
SHA256a3fe2fec3d432df98c211861dddffe114eae9905d7324a806e0258e11f03628e
SHA512087cf3f690ece24bc3fdb971c372b6f86a89e90ea0c6ac1498e8ce09b6e34b0aa7557a74f753f8ea61805199e2c19497b71a93cd25b56d33ca5806c14bdecd00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
973bb7c53c57bdf354f0209d6d5e64f1
SHA1bdc852287798f03a6cfe75a8cb93fbbf6c70ed02
SHA256158e90e929e569152c6959d88cf91c5d9d3e636eef79dffd1a5084e1397b38fd
SHA512beca005320adbfe1849fc76e87bb88ede1d57210e613b432a0b1911e217a88da69af68d9a9572ba7849a0be88e4ec49bb20a2fc87b77e2eee1c79964f5484198
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
b6f65894a8cd634594abb4f039263490
SHA13517613692d288c9a4918bb1f3b1d73a7fe48b40
SHA256b43895425b42e58fc977fb963e7687c909b13825a3dbb4a5be7f449b6e9a577e
SHA512ebd25e866192b8a7f9f9a75549ffb720dee94b7aa21b84914f250a1efcfdf45cc3ccf0836ede5fd355a0535b937b86f9e2d4be3ba8d5414a2c9495c9e4f15789
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
12b841bd2ec38ed54bffb7ef77389aac
SHA1118f89a72308f845ed4fb5ec835e7648e3b3ee21
SHA256c7f5d30a81dcbe1f002abdd50ef5a6d34c67ca4cf47f578ce7ea1708a68aeb45
SHA512b6d483cefad6bf9fd27d02166f98ec33871004014f8bee1d96d3f0083a25f903cf5cd938f69b10e3a14c152e3c452179f55c215b3ec8888d9701b327dd3612ce
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
285253c631f0d33b69956df32e68de01
SHA16ecf608ec06d7ba87e5ffcd55e20a604a6d1bab0
SHA256aee16e423069d235f1ff0d6f009eb5d3224aaf8f765decfef37553913156c30f
SHA51203702d02db924487c90babbd0924de04026cbd84a2b98b5312733db2e1fce442a6bba9766c082d2229f7eff4b1afd20ca5882263c6478c4dda5233e174b02c20
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
ca4633095e2a85f7670a5abc81918327
SHA18fdfa3b0d8df662fdb45613a6ba16b2a000692a3
SHA256523935b4b5cf4a3e240447289c7a9a62e6f4385aa840f360b142573c2da736ca
SHA5121d816e8ef8686b1994babbe66fd3ee84897790b197a8e0b171be793a050652de913110f4cecb32b58a3d13f343c8c23f9958163d512e5cd598fbbe144afa3e91
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
f880eb70a2cbe69c97a7a21a9cdd158d
SHA166d2475abf3a3d73db7be95dcf13d8c91364b02f
SHA2567275878f8711b7c5d603793c3a2e8f7b94e8831862364a0745f1d297224a0b10
SHA5127e7a82cdbc56a429c3a9395572bf0fff1ef62e9dff149e63b238f6f0d5c5a8277a2c3ebc8b5d07379fa46e899f8fbfb1735241eb848474a276dcb9ee720e3b10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
b1c932e7570ed97db56babca7aa3d0cd
SHA1189f0e02bd8ddf6a5c71fc44a86c564dd1784fe6
SHA256d753b882767dd879a1058d26752a39fbfd00e20855a303de4464a4dbb3b72e20
SHA5128d49063c293132a6ab1a5dbd6351d70672c130636111bfa1e301d0104a081e69a183c463d704c3d920f8bbeee5b67d1c7197d1ee78240b79fd9bb00519ab797c
-
C:\Users\Admin\AppData\Local\Temp\1000002001\k.exeMD5
fd73f81aa14d9ac2bed06703ddb406fc
SHA171201a58ed4a950b3b5fb1f01c2a4826f9e98180
SHA256f84d2af6ba8cf7bacc684fac666335b963632ce17775fa0bd7d25de9282cde01
SHA512b0474899f93aa9d46090fb02c6ef1a8ce283a19be29f13eec70b32059752c50fed05aa507da83c20a9a580f941d9987bb9c93518fac8210c3bd6a0cf815bf407
-
C:\Users\Admin\AppData\Local\Temp\1000002001\k.exeMD5
fd73f81aa14d9ac2bed06703ddb406fc
SHA171201a58ed4a950b3b5fb1f01c2a4826f9e98180
SHA256f84d2af6ba8cf7bacc684fac666335b963632ce17775fa0bd7d25de9282cde01
SHA512b0474899f93aa9d46090fb02c6ef1a8ce283a19be29f13eec70b32059752c50fed05aa507da83c20a9a580f941d9987bb9c93518fac8210c3bd6a0cf815bf407
-
C:\Users\Admin\AppData\Local\Temp\1000009001\et.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Users\Admin\AppData\Local\Temp\1000009001\et.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\91a0189a82\tkools.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\am.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\am.exeMD5
fe10a4f29bdb19294e5d23e946f2b41c
SHA1a20942b2f605342a95a23849195c8974b70ae273
SHA25601e1569c9614d44f66b8f493e36ce90a45da47c0007f6f2d9a36eadf79cc0851
SHA51232da7bd6d0dedd540f67818a19efe709fe508ccf282be1c65263589c64162ec9ebb9fdfd9026c24ec1e81e9b48ab533a4d2cf249eb07452ea624427e0fbc4add
-
C:\Users\Admin\AppData\Local\Temp\et.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Users\Admin\AppData\Local\Temp\et.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Users\Admin\AppData\Local\Temp\k.exeMD5
fd73f81aa14d9ac2bed06703ddb406fc
SHA171201a58ed4a950b3b5fb1f01c2a4826f9e98180
SHA256f84d2af6ba8cf7bacc684fac666335b963632ce17775fa0bd7d25de9282cde01
SHA512b0474899f93aa9d46090fb02c6ef1a8ce283a19be29f13eec70b32059752c50fed05aa507da83c20a9a580f941d9987bb9c93518fac8210c3bd6a0cf815bf407
-
C:\Users\Admin\AppData\Local\Temp\k.exeMD5
fd73f81aa14d9ac2bed06703ddb406fc
SHA171201a58ed4a950b3b5fb1f01c2a4826f9e98180
SHA256f84d2af6ba8cf7bacc684fac666335b963632ce17775fa0bd7d25de9282cde01
SHA512b0474899f93aa9d46090fb02c6ef1a8ce283a19be29f13eec70b32059752c50fed05aa507da83c20a9a580f941d9987bb9c93518fac8210c3bd6a0cf815bf407
-
C:\Windows\System32\Microsoft\Telemetry\sihost32.exeMD5
ad6711a4f144a46e1e744f0186385bd2
SHA188e6b0201ddaf8e9254f3fd0e840cdeada159fa3
SHA2567f4877c825f9ab42dd7f8376985f8059c4d605cc3d72ac22490211bbaedee660
SHA5122d52a8ad918ac95a853ea62a2a1d745e1510b4104c7cabbe7ab127d64fcdd1d619fe66a6fb83600abf0504d3f5c0855e63eeaa4d7c8a31c967e6f29d61c7dfa4
-
C:\Windows\System32\Microsoft\Telemetry\sihost32.exeMD5
ad6711a4f144a46e1e744f0186385bd2
SHA188e6b0201ddaf8e9254f3fd0e840cdeada159fa3
SHA2567f4877c825f9ab42dd7f8376985f8059c4d605cc3d72ac22490211bbaedee660
SHA5122d52a8ad918ac95a853ea62a2a1d745e1510b4104c7cabbe7ab127d64fcdd1d619fe66a6fb83600abf0504d3f5c0855e63eeaa4d7c8a31c967e6f29d61c7dfa4
-
C:\Windows\System32\services32.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Windows\System32\services32.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exeMD5
ad6711a4f144a46e1e744f0186385bd2
SHA188e6b0201ddaf8e9254f3fd0e840cdeada159fa3
SHA2567f4877c825f9ab42dd7f8376985f8059c4d605cc3d72ac22490211bbaedee660
SHA5122d52a8ad918ac95a853ea62a2a1d745e1510b4104c7cabbe7ab127d64fcdd1d619fe66a6fb83600abf0504d3f5c0855e63eeaa4d7c8a31c967e6f29d61c7dfa4
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exeMD5
ad6711a4f144a46e1e744f0186385bd2
SHA188e6b0201ddaf8e9254f3fd0e840cdeada159fa3
SHA2567f4877c825f9ab42dd7f8376985f8059c4d605cc3d72ac22490211bbaedee660
SHA5122d52a8ad918ac95a853ea62a2a1d745e1510b4104c7cabbe7ab127d64fcdd1d619fe66a6fb83600abf0504d3f5c0855e63eeaa4d7c8a31c967e6f29d61c7dfa4
-
C:\Windows\system32\services32.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
C:\Windows\system32\services32.exeMD5
cd06b2114626a7ac7829f440a08f6995
SHA180c87ec2f3b6dda5dc7bad8a97f021a751befb18
SHA2564a291c7b3e0aef77dc7c17163536722d9df1bc025744fde659fd7c14c9e6ece2
SHA51219aa3b9877a12cdaf3b94007e9cf115553768e816b309533ef437eea1b44b1332520e11be414fced3a4d95556dc842c5ef62fbd9d1bafb1f7e77ced9c245f4d7
-
memory/504-202-0x0000000001310000-0x0000000001BD4000-memory.dmpFilesize
8.8MB
-
memory/504-179-0x0000000000000000-mapping.dmp
-
memory/504-185-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/584-220-0x0000000000000000-mapping.dmp
-
memory/584-263-0x000001BD50788000-0x000001BD50789000-memory.dmpFilesize
4KB
-
memory/584-260-0x000001BD50786000-0x000001BD50788000-memory.dmpFilesize
8KB
-
memory/584-259-0x000001BD50783000-0x000001BD50785000-memory.dmpFilesize
8KB
-
memory/584-258-0x000001BD50780000-0x000001BD50782000-memory.dmpFilesize
8KB
-
memory/644-169-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-174-0x000001D8B9883000-0x000001D8B9885000-memory.dmpFilesize
8KB
-
memory/644-189-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-163-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-164-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-188-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-369-0x0000000000000000-mapping.dmp
-
memory/644-378-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/644-217-0x000001D8B9888000-0x000001D8B9889000-memory.dmpFilesize
4KB
-
memory/644-165-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-171-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-183-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-173-0x000001D8B9880000-0x000001D8B9882000-memory.dmpFilesize
8KB
-
memory/644-161-0x0000000000000000-mapping.dmp
-
memory/644-207-0x000001D8B9886000-0x000001D8B9888000-memory.dmpFilesize
8KB
-
memory/644-175-0x000001D8B9840000-0x000001D8B9841000-memory.dmpFilesize
4KB
-
memory/644-176-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-178-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-177-0x000001D89F920000-0x000001D89F922000-memory.dmpFilesize
8KB
-
memory/644-372-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/644-180-0x000001D8BB9E0000-0x000001D8BB9E1000-memory.dmpFilesize
4KB
-
memory/788-380-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/860-162-0x0000000000000000-mapping.dmp
-
memory/908-513-0x00000000021A0000-0x00000000021A2000-memory.dmpFilesize
8KB
-
memory/908-484-0x0000000000000000-mapping.dmp
-
memory/984-272-0x0000000000000000-mapping.dmp
-
memory/1064-214-0x0000000000000000-mapping.dmp
-
memory/1120-391-0x0000000000000000-mapping.dmp
-
memory/1120-432-0x000002D9CA633000-0x000002D9CA635000-memory.dmpFilesize
8KB
-
memory/1120-431-0x000002D9CA630000-0x000002D9CA632000-memory.dmpFilesize
8KB
-
memory/1120-433-0x000002D9CA636000-0x000002D9CA638000-memory.dmpFilesize
8KB
-
memory/1120-471-0x000002D9CA638000-0x000002D9CA639000-memory.dmpFilesize
4KB
-
memory/1272-266-0x0000000000000000-mapping.dmp
-
memory/1272-273-0x0000000003030000-0x0000000003032000-memory.dmpFilesize
8KB
-
memory/1316-172-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/1316-168-0x00000000052C0000-0x00000000052C1000-memory.dmpFilesize
4KB
-
memory/1316-157-0x0000000001350000-0x0000000001351000-memory.dmpFilesize
4KB
-
memory/1316-156-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/1316-150-0x0000000000000000-mapping.dmp
-
memory/1344-475-0x000002646C276000-0x000002646C278000-memory.dmpFilesize
8KB
-
memory/1344-438-0x0000000000000000-mapping.dmp
-
memory/1344-472-0x000002646C270000-0x000002646C272000-memory.dmpFilesize
8KB
-
memory/1344-473-0x000002646C273000-0x000002646C275000-memory.dmpFilesize
8KB
-
memory/1344-481-0x000002646C278000-0x000002646C279000-memory.dmpFilesize
4KB
-
memory/1592-264-0x0000000000000000-mapping.dmp
-
memory/2276-491-0x0000000000000000-mapping.dmp
-
memory/2340-125-0x0000000001370000-0x0000000001371000-memory.dmpFilesize
4KB
-
memory/2340-130-0x0000000073DF0000-0x0000000075138000-memory.dmpFilesize
19.3MB
-
memory/2340-116-0x0000000000240000-0x00000000002E5000-memory.dmpFilesize
660KB
-
memory/2340-117-0x0000000000410000-0x0000000000411000-memory.dmpFilesize
4KB
-
memory/2340-140-0x0000000006950000-0x0000000006951000-memory.dmpFilesize
4KB
-
memory/2340-118-0x00000000769D0000-0x0000000076B92000-memory.dmpFilesize
1.8MB
-
memory/2340-119-0x0000000002A40000-0x0000000002A85000-memory.dmpFilesize
276KB
-
memory/2340-120-0x0000000075B20000-0x0000000075C11000-memory.dmpFilesize
964KB
-
memory/2340-121-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/2340-123-0x0000000071EF0000-0x0000000071F70000-memory.dmpFilesize
512KB
-
memory/2340-139-0x00000000070D0000-0x00000000070D1000-memory.dmpFilesize
4KB
-
memory/2340-124-0x0000000005960000-0x0000000005961000-memory.dmpFilesize
4KB
-
memory/2340-126-0x0000000005350000-0x0000000005351000-memory.dmpFilesize
4KB
-
memory/2340-127-0x00000000051D0000-0x00000000051D1000-memory.dmpFilesize
4KB
-
memory/2340-128-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/2340-115-0x0000000000240000-0x00000000002E5000-memory.dmpFilesize
660KB
-
memory/2340-138-0x00000000069D0000-0x00000000069D1000-memory.dmpFilesize
4KB
-
memory/2340-137-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/2340-136-0x0000000006470000-0x0000000006471000-memory.dmpFilesize
4KB
-
memory/2340-135-0x0000000005820000-0x0000000005821000-memory.dmpFilesize
4KB
-
memory/2340-134-0x0000000005280000-0x0000000005281000-memory.dmpFilesize
4KB
-
memory/2340-133-0x0000000005F70000-0x0000000005F71000-memory.dmpFilesize
4KB
-
memory/2340-132-0x0000000070920000-0x000000007096B000-memory.dmpFilesize
300KB
-
memory/2340-129-0x0000000076C20000-0x00000000771A4000-memory.dmpFilesize
5.5MB
-
memory/2340-131-0x0000000003050000-0x0000000003051000-memory.dmpFilesize
4KB
-
memory/2372-492-0x0000000000000000-mapping.dmp
-
memory/2372-555-0x000001B06B878000-0x000001B06B879000-memory.dmpFilesize
4KB
-
memory/2372-554-0x000001B06B876000-0x000001B06B878000-memory.dmpFilesize
8KB
-
memory/2372-515-0x000001B06B870000-0x000001B06B872000-memory.dmpFilesize
8KB
-
memory/2372-516-0x000001B06B873000-0x000001B06B875000-memory.dmpFilesize
8KB
-
memory/2452-401-0x0000000000000000-mapping.dmp
-
memory/2752-399-0x0000000000000000-mapping.dmp
-
memory/2800-316-0x000000001CA10000-0x000000001CA12000-memory.dmpFilesize
8KB
-
memory/2800-280-0x0000000000000000-mapping.dmp
-
memory/2836-141-0x0000000000000000-mapping.dmp
-
memory/2836-154-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/2836-167-0x00000000010B0000-0x0000000001974000-memory.dmpFilesize
8.8MB
-
memory/2836-170-0x00000000010B0000-0x0000000001974000-memory.dmpFilesize
8.8MB
-
memory/2876-212-0x0000000000000000-mapping.dmp
-
memory/2944-430-0x000000001BE30000-0x000000001BE32000-memory.dmpFilesize
8KB
-
memory/2944-383-0x0000000000000000-mapping.dmp
-
memory/2968-517-0x000000001C3A0000-0x000000001C3A2000-memory.dmpFilesize
8KB
-
memory/2968-500-0x0000000000000000-mapping.dmp
-
memory/3080-341-0x000001A9FDFF8000-0x000001A9FDFF9000-memory.dmpFilesize
4KB
-
memory/3080-312-0x000001A9FDFF0000-0x000001A9FDFF2000-memory.dmpFilesize
8KB
-
memory/3080-274-0x0000000000000000-mapping.dmp
-
memory/3080-319-0x000001A9FDFF6000-0x000001A9FDFF8000-memory.dmpFilesize
8KB
-
memory/3080-314-0x000001A9FDFF3000-0x000001A9FDFF5000-memory.dmpFilesize
8KB
-
memory/3204-586-0x00000166BDC06000-0x00000166BDC08000-memory.dmpFilesize
8KB
-
memory/3204-587-0x00000166BDC08000-0x00000166BDC09000-memory.dmpFilesize
4KB
-
memory/3204-557-0x00000166BDC03000-0x00000166BDC05000-memory.dmpFilesize
8KB
-
memory/3204-556-0x00000166BDC00000-0x00000166BDC02000-memory.dmpFilesize
8KB
-
memory/3204-542-0x0000000000000000-mapping.dmp
-
memory/3252-153-0x0000000000000000-mapping.dmp
-
memory/3380-345-0x0000015780093000-0x0000015780095000-memory.dmpFilesize
8KB
-
memory/3380-368-0x0000015780098000-0x0000015780099000-memory.dmpFilesize
4KB
-
memory/3380-343-0x0000015780090000-0x0000015780092000-memory.dmpFilesize
8KB
-
memory/3380-324-0x0000000000000000-mapping.dmp
-
memory/3380-347-0x0000015780096000-0x0000015780098000-memory.dmpFilesize
8KB
-
memory/3452-482-0x0000000000000000-mapping.dmp
-
memory/3652-390-0x0000000000000000-mapping.dmp
-
memory/3848-213-0x0000000000000000-mapping.dmp
-
memory/3988-149-0x0000000001EE0000-0x0000000001EE1000-memory.dmpFilesize
4KB
-
memory/3988-155-0x000000001CA60000-0x000000001CA62000-memory.dmpFilesize
8KB
-
memory/3988-147-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/3988-144-0x0000000000000000-mapping.dmp
-
memory/4016-589-0x0000000077300000-0x000000007748E000-memory.dmpFilesize
1.6MB
-
memory/4084-166-0x0000000000000000-mapping.dmp