Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
08-01-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe
Resource
win10-en-20211208
General
-
Target
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe
-
Size
267KB
-
MD5
c9e9f943d27b1c7e6f13b7e0d90736c8
-
SHA1
f7eea14657a9630011a3c68f5dad67bf2621d183
-
SHA256
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
-
SHA512
fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
raccoon
10da56e7e71e97bdc1f36eb76813bbc3231de7e4
-
url4cnc
http://194.180.174.53/capibar
http://91.219.236.18/capibar
http://194.180.174.41/capibar
http://91.219.236.148/capibar
https://t.me/capibar
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 3264 created 2772 3264 WerFault.exe CF86.exe -
Arkei Stealer Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/400-141-0x0000000000400000-0x0000000002B81000-memory.dmp family_arkei behavioral1/memory/3264-187-0x0000000000E10000-0x0000000000F74000-memory.dmp family_arkei behavioral1/memory/3264-188-0x0000000000E10000-0x0000000000F74000-memory.dmp family_arkei behavioral1/memory/3264-190-0x0000000000E10000-0x0000000000F74000-memory.dmp family_arkei -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
F703.exeF703.exe1644.exe3631.exewdgiseg496C.exewdgiseg496C.exeB99C.exeCF86.exeFBE6.exeD0E.exedllhost.exe18A8.exe224D.exepid process 2784 F703.exe 2740 F703.exe 1588 1644.exe 400 3631.exe 1256 wdgiseg 4060 496C.exe 1396 wdgiseg 2304 496C.exe 3264 B99C.exe 2772 CF86.exe 668 FBE6.exe 340 D0E.exe 2232 dllhost.exe 3728 18A8.exe 836 224D.exe -
Deletes itself 1 IoCs
Processes:
pid process 3040 -
Loads dropped DLL 6 IoCs
Processes:
3631.exeB99C.exepid process 400 3631.exe 400 3631.exe 400 3631.exe 3264 B99C.exe 3264 B99C.exe 3264 B99C.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 137 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
B99C.exepid process 3264 B99C.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exeF703.exewdgiseg496C.exedescription pid process target process PID 2672 set thread context of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2784 set thread context of 2740 2784 F703.exe F703.exe PID 1256 set thread context of 1396 1256 wdgiseg wdgiseg PID 4060 set thread context of 2304 4060 496C.exe 496C.exe -
Drops file in Windows directory 1 IoCs
Processes:
WerFault.exedescription ioc process File created C:\Windows\AppCompat\Programs\Amcache.hve.tmp WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1252 2232 WerFault.exe dllhost.exe 952 3728 WerFault.exe 18A8.exe 2892 836 WerFault.exe 224D.exe 3264 2772 WerFault.exe CF86.exe -
Checks SCSI registry key(s) 3 TTPs 12 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1644.exewdgiseg07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exeF703.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1644.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1644.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1644.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wdgiseg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F703.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wdgiseg Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI wdgiseg Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F703.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
B99C.exedllhost.exe3631.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 B99C.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString B99C.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 dllhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier dllhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3631.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3631.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2940 timeout.exe 3092 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exepid process 3956 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 3956 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious behavior: MapViewOfSection 4 IoCs
Processes:
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exeF703.exe1644.exewdgisegpid process 3956 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 2740 F703.exe 1588 1644.exe 1396 wdgiseg -
Suspicious use of AdjustPrivilegeToken 61 IoCs
Processes:
496C.exe496C.exeFBE6.exeD0E.exedllhost.exeWerFault.exe18A8.exeWerFault.exeWerFault.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 4060 496C.exe Token: SeDebugPrivilege 2304 496C.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 668 FBE6.exe Token: SeDebugPrivilege 340 D0E.exe Token: SeDebugPrivilege 2232 dllhost.exe Token: SeDebugPrivilege 1252 WerFault.exe Token: SeDebugPrivilege 3728 18A8.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 952 WerFault.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeRestorePrivilege 2892 WerFault.exe Token: SeBackupPrivilege 2892 WerFault.exe Token: SeBackupPrivilege 2892 WerFault.exe Token: SeDebugPrivilege 2892 WerFault.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeDebugPrivilege 3264 WerFault.exe Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exeF703.exewdgiseg496C.exe3631.execmd.exeB99C.execmd.exeD0E.exedescription pid process target process PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 2672 wrote to memory of 3956 2672 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe 07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe PID 3040 wrote to memory of 2784 3040 F703.exe PID 3040 wrote to memory of 2784 3040 F703.exe PID 3040 wrote to memory of 2784 3040 F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 2784 wrote to memory of 2740 2784 F703.exe F703.exe PID 3040 wrote to memory of 1588 3040 1644.exe PID 3040 wrote to memory of 1588 3040 1644.exe PID 3040 wrote to memory of 1588 3040 1644.exe PID 3040 wrote to memory of 400 3040 3631.exe PID 3040 wrote to memory of 400 3040 3631.exe PID 3040 wrote to memory of 400 3040 3631.exe PID 3040 wrote to memory of 4060 3040 496C.exe PID 3040 wrote to memory of 4060 3040 496C.exe PID 3040 wrote to memory of 4060 3040 496C.exe PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 1256 wrote to memory of 1396 1256 wdgiseg wdgiseg PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 4060 wrote to memory of 2304 4060 496C.exe 496C.exe PID 400 wrote to memory of 3804 400 3631.exe cmd.exe PID 400 wrote to memory of 3804 400 3631.exe cmd.exe PID 400 wrote to memory of 3804 400 3631.exe cmd.exe PID 3804 wrote to memory of 2940 3804 cmd.exe timeout.exe PID 3804 wrote to memory of 2940 3804 cmd.exe timeout.exe PID 3804 wrote to memory of 2940 3804 cmd.exe timeout.exe PID 3040 wrote to memory of 3264 3040 B99C.exe PID 3040 wrote to memory of 3264 3040 B99C.exe PID 3040 wrote to memory of 3264 3040 B99C.exe PID 3040 wrote to memory of 2772 3040 CF86.exe PID 3040 wrote to memory of 2772 3040 CF86.exe PID 3040 wrote to memory of 2772 3040 CF86.exe PID 3264 wrote to memory of 2564 3264 B99C.exe cmd.exe PID 3264 wrote to memory of 2564 3264 B99C.exe cmd.exe PID 3264 wrote to memory of 2564 3264 B99C.exe cmd.exe PID 2564 wrote to memory of 3092 2564 cmd.exe timeout.exe PID 2564 wrote to memory of 3092 2564 cmd.exe timeout.exe PID 2564 wrote to memory of 3092 2564 cmd.exe timeout.exe PID 3040 wrote to memory of 668 3040 FBE6.exe PID 3040 wrote to memory of 668 3040 FBE6.exe PID 3040 wrote to memory of 668 3040 FBE6.exe PID 3040 wrote to memory of 340 3040 D0E.exe PID 3040 wrote to memory of 340 3040 D0E.exe PID 340 wrote to memory of 2232 340 D0E.exe dllhost.exe PID 340 wrote to memory of 2232 340 D0E.exe dllhost.exe PID 3040 wrote to memory of 3728 3040 18A8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"C:\Users\Admin\AppData\Local\Temp\07d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F703.exeC:\Users\Admin\AppData\Local\Temp\F703.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\F703.exeC:\Users\Admin\AppData\Local\Temp\F703.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1644.exeC:\Users\Admin\AppData\Local\Temp\1644.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3631.exeC:\Users\Admin\AppData\Local\Temp\3631.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3631.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\wdgisegC:\Users\Admin\AppData\Roaming\wdgiseg1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\wdgisegC:\Users\Admin\AppData\Roaming\wdgiseg2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\496C.exeC:\Users\Admin\AppData\Local\Temp\496C.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\496C.exeC:\Users\Admin\AppData\Local\Temp\496C.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\B99C.exeC:\Users\Admin\AppData\Local\Temp\B99C.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\B99C.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\CF86.exeC:\Users\Admin\AppData\Local\Temp\CF86.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2772 -s 11882⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\FBE6.exeC:\Users\Admin\AppData\Local\Temp\FBE6.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\D0E.exeC:\Users\Admin\AppData\Local\Temp\D0E.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2232 -s 14643⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\18A8.exeC:\Users\Admin\AppData\Local\Temp\18A8.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3728 -s 18122⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\224D.exeC:\Users\Admin\AppData\Local\Temp\224D.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 4002⤵
- Drops file in Windows directory
- Program crash
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\496C.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\1644.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\1644.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\18A8.exeMD5
a14bb1b40237f948bdd1db8ebbe3c5ef
SHA1241074187e57642d16ddd08ed940eafee6f21314
SHA25651e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e
SHA5121851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab
-
C:\Users\Admin\AppData\Local\Temp\18A8.exeMD5
a14bb1b40237f948bdd1db8ebbe3c5ef
SHA1241074187e57642d16ddd08ed940eafee6f21314
SHA25651e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e
SHA5121851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab
-
C:\Users\Admin\AppData\Local\Temp\224D.exeMD5
2f08733bdd7dc332033f3965362020dd
SHA1d369719f0cdecb3f65fe86d3f24d85c27ed919ed
SHA25666805bc10196803d9ff93e819a7ecc84867607d8342b01fd614abc58b332a545
SHA51287a582d0fe780385f0cdf59b2c52145b644cb69045751ab23e974cd0d7db5cca6188e44bd41536f84be92a72ba4eaa5c5a2ac228393a251441dee7d0ff047d38
-
C:\Users\Admin\AppData\Local\Temp\224D.exeMD5
2f08733bdd7dc332033f3965362020dd
SHA1d369719f0cdecb3f65fe86d3f24d85c27ed919ed
SHA25666805bc10196803d9ff93e819a7ecc84867607d8342b01fd614abc58b332a545
SHA51287a582d0fe780385f0cdf59b2c52145b644cb69045751ab23e974cd0d7db5cca6188e44bd41536f84be92a72ba4eaa5c5a2ac228393a251441dee7d0ff047d38
-
C:\Users\Admin\AppData\Local\Temp\3631.exeMD5
8665189d8bffdd7f0ccc67b66df5d11b
SHA15c1bfde2bf91f594fe373a4aa510848422b8c264
SHA2561388e957020a3909ddc6a9570326c868ecc12a6e39f6029e1cf8b2c342e1fea9
SHA5129617b6d98c9124d2c1e2e554be4de61bc0aadfd1cc0c577a2dc7a500d4f22d7dd1e81b45c208388fccf316858b18a6763a3e78c9a797bbba889d27ba6c341149
-
C:\Users\Admin\AppData\Local\Temp\3631.exeMD5
8665189d8bffdd7f0ccc67b66df5d11b
SHA15c1bfde2bf91f594fe373a4aa510848422b8c264
SHA2561388e957020a3909ddc6a9570326c868ecc12a6e39f6029e1cf8b2c342e1fea9
SHA5129617b6d98c9124d2c1e2e554be4de61bc0aadfd1cc0c577a2dc7a500d4f22d7dd1e81b45c208388fccf316858b18a6763a3e78c9a797bbba889d27ba6c341149
-
C:\Users\Admin\AppData\Local\Temp\496C.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\496C.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\496C.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\B99C.exeMD5
8da8a8243f31492604ca9d893d877388
SHA1d4bdfb1a7873cc2f81928712ac0e0a6a00c7592b
SHA256af01a7c85a964816f29a90703ab0db0e4afda17e5ab4842a0d7f353284f17646
SHA512c4a5b67278b5fc1700b45e21000db911176929998fe3f624511763c6a3092e48da30de651b30b94297f14f1c0edec8e295c9ac5bf98e55be51cacd2ae457cbdf
-
C:\Users\Admin\AppData\Local\Temp\B99C.exeMD5
8da8a8243f31492604ca9d893d877388
SHA1d4bdfb1a7873cc2f81928712ac0e0a6a00c7592b
SHA256af01a7c85a964816f29a90703ab0db0e4afda17e5ab4842a0d7f353284f17646
SHA512c4a5b67278b5fc1700b45e21000db911176929998fe3f624511763c6a3092e48da30de651b30b94297f14f1c0edec8e295c9ac5bf98e55be51cacd2ae457cbdf
-
C:\Users\Admin\AppData\Local\Temp\CF86.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\CF86.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\D0E.exeMD5
a14bb1b40237f948bdd1db8ebbe3c5ef
SHA1241074187e57642d16ddd08ed940eafee6f21314
SHA25651e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e
SHA5121851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab
-
C:\Users\Admin\AppData\Local\Temp\D0E.exeMD5
a14bb1b40237f948bdd1db8ebbe3c5ef
SHA1241074187e57642d16ddd08ed940eafee6f21314
SHA25651e53448de757715f6018b0d5fc7fdb03b653cee81890129b3a7b528f6c1259e
SHA5121851eb243db2e25422d75a60f5f8cb479694b262564b8acedb62e35b84539904f66627d43dc6332d82f0e4092ec2b6d3cdb4fcf32059f0f9885168b8a49186ab
-
C:\Users\Admin\AppData\Local\Temp\F703.exeMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
C:\Users\Admin\AppData\Local\Temp\F703.exeMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
C:\Users\Admin\AppData\Local\Temp\F703.exeMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
C:\Users\Admin\AppData\Local\Temp\FBE6.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\FBE6.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\dllhost.exeMD5
7f34900d68ed5d0cbf791e0f445bcdca
SHA13dd65dd03120e099270c94f7ececf4aa51dc805b
SHA256e122401c4ab2e6e74fe004d53177e7950b3a12226335bb217337b2a237e6f791
SHA5121a73af71a04e750509d40f5c79fcf58ff0058c49d51b1e4f433b35a76a0774fc350e89089544727c67a394d61312a81c29cd19fe639ee4cffab40b27160d1ca5
-
C:\Users\Admin\AppData\Local\Temp\dllhost.exeMD5
7f34900d68ed5d0cbf791e0f445bcdca
SHA13dd65dd03120e099270c94f7ececf4aa51dc805b
SHA256e122401c4ab2e6e74fe004d53177e7950b3a12226335bb217337b2a237e6f791
SHA5121a73af71a04e750509d40f5c79fcf58ff0058c49d51b1e4f433b35a76a0774fc350e89089544727c67a394d61312a81c29cd19fe639ee4cffab40b27160d1ca5
-
C:\Users\Admin\AppData\Roaming\wdgisegMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
C:\Users\Admin\AppData\Roaming\wdgisegMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
C:\Users\Admin\AppData\Roaming\wdgisegMD5
c9e9f943d27b1c7e6f13b7e0d90736c8
SHA1f7eea14657a9630011a3c68f5dad67bf2621d183
SHA25607d2cd5a0d2a7ef78e89f70fa701d4645c3c47b852d34bb2d81bcecce771ba29
SHA512fd13f5d52525beb6f52e1ab412f6a7aa81b2efbfa5d759124c1a2c3a29280b8bfd9bffaa0ca00cd172a91266b19cfd32095a97b7c88d6258b9a2a8cae55e34fb
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/340-235-0x0000026A1C9B0000-0x0000026A1C9B2000-memory.dmpFilesize
8KB
-
memory/340-234-0x0000026A1C4E0000-0x0000026A1C52E000-memory.dmpFilesize
312KB
-
memory/340-233-0x0000026A1C4E0000-0x0000026A1C52E000-memory.dmpFilesize
312KB
-
memory/340-230-0x0000000000000000-mapping.dmp
-
memory/400-140-0x0000000002B90000-0x0000000002C3E000-memory.dmpFilesize
696KB
-
memory/400-136-0x0000000000000000-mapping.dmp
-
memory/400-139-0x0000000002B90000-0x0000000002C3E000-memory.dmpFilesize
696KB
-
memory/400-141-0x0000000000400000-0x0000000002B81000-memory.dmpFilesize
39.5MB
-
memory/668-227-0x00000000021D2000-0x00000000021D3000-memory.dmpFilesize
4KB
-
memory/668-222-0x0000000005770000-0x00000000057AE000-memory.dmpFilesize
248KB
-
memory/668-218-0x0000000002470000-0x00000000024A2000-memory.dmpFilesize
200KB
-
memory/668-217-0x0000000004AB0000-0x0000000004FAE000-memory.dmpFilesize
5.0MB
-
memory/668-216-0x00000000021F0000-0x0000000002224000-memory.dmpFilesize
208KB
-
memory/668-215-0x0000000000791000-0x00000000007BD000-memory.dmpFilesize
176KB
-
memory/668-220-0x00000000055D0000-0x00000000055E2000-memory.dmpFilesize
72KB
-
memory/668-221-0x0000000005600000-0x000000000570A000-memory.dmpFilesize
1.0MB
-
memory/668-212-0x0000000000000000-mapping.dmp
-
memory/668-219-0x0000000004FB0000-0x00000000055B6000-memory.dmpFilesize
6.0MB
-
memory/668-223-0x00000000057B0000-0x00000000057FB000-memory.dmpFilesize
300KB
-
memory/668-224-0x00000000001C0000-0x00000000001F9000-memory.dmpFilesize
228KB
-
memory/668-226-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/668-229-0x00000000021D4000-0x00000000021D6000-memory.dmpFilesize
8KB
-
memory/668-228-0x00000000021D3000-0x00000000021D4000-memory.dmpFilesize
4KB
-
memory/668-225-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/836-253-0x0000000000000000-mapping.dmp
-
memory/1256-152-0x0000000002C70000-0x0000000002C79000-memory.dmpFilesize
36KB
-
memory/1396-150-0x0000000000402F47-mapping.dmp
-
memory/1588-134-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/1588-133-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/1588-129-0x0000000000000000-mapping.dmp
-
memory/2232-240-0x000001EB4AC70000-0x000001EB4ACAA000-memory.dmpFilesize
232KB
-
memory/2232-241-0x000001EB4C820000-0x000001EB4C870000-memory.dmpFilesize
320KB
-
memory/2232-236-0x0000000000000000-mapping.dmp
-
memory/2232-239-0x000001EB4AC70000-0x000001EB4ACAA000-memory.dmpFilesize
232KB
-
memory/2304-158-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2304-159-0x0000000000419192-mapping.dmp
-
memory/2304-167-0x0000000005570000-0x00000000055AE000-memory.dmpFilesize
248KB
-
memory/2304-176-0x0000000006480000-0x00000000064E6000-memory.dmpFilesize
408KB
-
memory/2304-166-0x0000000005640000-0x000000000574A000-memory.dmpFilesize
1.0MB
-
memory/2304-165-0x0000000005510000-0x0000000005522000-memory.dmpFilesize
72KB
-
memory/2304-177-0x0000000006FB0000-0x0000000007172000-memory.dmpFilesize
1.8MB
-
memory/2304-168-0x00000000055B0000-0x00000000055FB000-memory.dmpFilesize
300KB
-
memory/2304-174-0x0000000006660000-0x0000000006B5E000-memory.dmpFilesize
5.0MB
-
memory/2304-173-0x00000000060C0000-0x0000000006152000-memory.dmpFilesize
584KB
-
memory/2304-178-0x00000000076B0000-0x0000000007BDC000-memory.dmpFilesize
5.2MB
-
memory/2304-175-0x00000000062A0000-0x00000000062BE000-memory.dmpFilesize
120KB
-
memory/2304-162-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2304-172-0x0000000005910000-0x0000000005986000-memory.dmpFilesize
472KB
-
memory/2304-163-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2304-169-0x00000000054A0000-0x0000000005AA6000-memory.dmpFilesize
6.0MB
-
memory/2304-164-0x0000000005AB0000-0x00000000060B6000-memory.dmpFilesize
6.0MB
-
memory/2564-202-0x0000000000000000-mapping.dmp
-
memory/2672-117-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/2672-118-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/2740-124-0x0000000000402F47-mapping.dmp
-
memory/2772-196-0x0000000000C52000-0x0000000000CC6000-memory.dmpFilesize
464KB
-
memory/2772-197-0x0000000000D40000-0x0000000000DD7000-memory.dmpFilesize
604KB
-
memory/2772-209-0x0000000000BC0000-0x0000000000C10000-memory.dmpFilesize
320KB
-
memory/2772-210-0x0000000002910000-0x00000000029A2000-memory.dmpFilesize
584KB
-
memory/2772-211-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2772-207-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2772-206-0x00000000026D0000-0x0000000002765000-memory.dmpFilesize
596KB
-
memory/2772-205-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2772-204-0x0000000000CCC000-0x0000000000D29000-memory.dmpFilesize
372KB
-
memory/2772-208-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2772-193-0x0000000000000000-mapping.dmp
-
memory/2772-198-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/2784-120-0x0000000000000000-mapping.dmp
-
memory/2784-127-0x0000000002CC0000-0x0000000002E0A000-memory.dmpFilesize
1.3MB
-
memory/2784-126-0x0000000002CA0000-0x0000000002CA9000-memory.dmpFilesize
36KB
-
memory/2940-182-0x0000000000000000-mapping.dmp
-
memory/3040-135-0x00000000033C0000-0x00000000033D6000-memory.dmpFilesize
88KB
-
memory/3040-170-0x0000000003510000-0x0000000003526000-memory.dmpFilesize
88KB
-
memory/3040-119-0x0000000001460000-0x0000000001476000-memory.dmpFilesize
88KB
-
memory/3040-128-0x0000000001560000-0x0000000001576000-memory.dmpFilesize
88KB
-
memory/3092-203-0x0000000000000000-mapping.dmp
-
memory/3264-188-0x0000000000E10000-0x0000000000F74000-memory.dmpFilesize
1.4MB
-
memory/3264-183-0x0000000000000000-mapping.dmp
-
memory/3264-186-0x0000000000E10000-0x0000000000F74000-memory.dmpFilesize
1.4MB
-
memory/3264-190-0x0000000000E10000-0x0000000000F74000-memory.dmpFilesize
1.4MB
-
memory/3264-192-0x0000000074860000-0x0000000074A22000-memory.dmpFilesize
1.8MB
-
memory/3264-191-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/3264-187-0x0000000000E10000-0x0000000000F74000-memory.dmpFilesize
1.4MB
-
memory/3264-189-0x0000000002670000-0x00000000026B6000-memory.dmpFilesize
280KB
-
memory/3728-243-0x0000000000000000-mapping.dmp
-
memory/3804-181-0x0000000000000000-mapping.dmp
-
memory/3956-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/3956-116-0x0000000000402F47-mapping.dmp
-
memory/4060-153-0x0000000004A90000-0x0000000004B06000-memory.dmpFilesize
472KB
-
memory/4060-154-0x0000000004A70000-0x0000000004A8E000-memory.dmpFilesize
120KB
-
memory/4060-148-0x00000000000E0000-0x000000000016A000-memory.dmpFilesize
552KB
-
memory/4060-147-0x00000000000E0000-0x000000000016A000-memory.dmpFilesize
552KB
-
memory/4060-144-0x0000000000000000-mapping.dmp
-
memory/4060-155-0x0000000005300000-0x00000000057FE000-memory.dmpFilesize
5.0MB
-
memory/4060-156-0x0000000004BC0000-0x0000000004BC1000-memory.dmpFilesize
4KB
-
memory/4060-157-0x00000000025A0000-0x00000000025A1000-memory.dmpFilesize
4KB