Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-01-2022 09:17
Static task
static1
Behavioral task
behavioral1
Sample
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe
Resource
win10-en-20211208
General
-
Target
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe
-
Size
295KB
-
MD5
874b04fb066c89585b30aa4f1027753d
-
SHA1
c012eddde35de134a16fada92bd665440af7d55f
-
SHA256
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59
-
SHA512
cd379453d5885400c511d634c500c9ca7daf073885beba9fbd707f694d66c32c7d1e55010c350f784554bd17bf9e782ee12d1c930034eb0d8c824344523b109e
Malware Config
Extracted
smokeloader
2020
http://host-data-coin-11.com/
http://file-coin-host-12.com/
http://srtuiyhuali.at/
http://fufuiloirtu.com/
http://amogohuigotuli.at/
http://novohudosovu.com/
http://brutuilionust.com/
http://bubushkalioua.com/
http://dumuilistrati.at/
http://verboliatsiaeeees.com/
Extracted
tofsee
patmushta.info
parubey.info
Extracted
raccoon
10da56e7e71e97bdc1f36eb76813bbc3231de7e4
-
url4cnc
http://194.180.174.53/capibar
http://91.219.236.18/capibar
http://194.180.174.41/capibar
http://91.219.236.148/capibar
https://t.me/capibar
Signatures
-
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2928 created 5096 2928 WerFault.exe D033.exe -
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Arkei Stealer Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4420-140-0x0000000002DE0000-0x0000000002DFC000-memory.dmp family_arkei behavioral1/memory/4420-141-0x0000000000400000-0x0000000002B87000-memory.dmp family_arkei behavioral1/memory/568-146-0x0000000002CE0000-0x0000000002E2A000-memory.dmp family_arkei behavioral1/memory/4996-197-0x0000000000B30000-0x0000000000C90000-memory.dmp family_arkei behavioral1/memory/4996-198-0x0000000000B30000-0x0000000000C90000-memory.dmp family_arkei -
Creates new service(s) 1 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
F85B.exeF85B.exe1625.exe3585.exe419C.exe4B03.exerhrtfofk.exe4B03.exe4B03.exe4B03.exeBA68.exeD033.exeFCE1.exe1888.exepid process 4076 F85B.exe 4472 F85B.exe 708 1625.exe 4420 3585.exe 568 419C.exe 792 4B03.exe 2700 rhrtfofk.exe 2096 4B03.exe 4880 4B03.exe 4992 4B03.exe 4996 BA68.exe 5096 D033.exe 2344 FCE1.exe 1656 1888.exe -
Modifies Windows Firewall 1 TTPs
-
Sets service image path in registry 2 TTPs
-
Deletes itself 1 IoCs
Processes:
pid process 372 -
Loads dropped DLL 3 IoCs
Processes:
BA68.exepid process 4996 BA68.exe 4996 BA68.exe 4996 BA68.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
BA68.exe1888.exepid process 4996 BA68.exe 1656 1888.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exeF85B.exerhrtfofk.exe4B03.exedescription pid process target process PID 3716 set thread context of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 4076 set thread context of 4472 4076 F85B.exe F85B.exe PID 2700 set thread context of 1288 2700 rhrtfofk.exe svchost.exe PID 792 set thread context of 4992 792 4B03.exe 4B03.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2928 5096 WerFault.exe D033.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
F85B.exec3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe1625.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F85B.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F85B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1625.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1625.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1625.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI F85B.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
BA68.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 BA68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString BA68.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4568 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exepid process 2276 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe 2276 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 372 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 372 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exeF85B.exe1625.exepid process 2276 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe 4472 F85B.exe 708 1625.exe 372 372 372 372 -
Suspicious use of AdjustPrivilegeToken 57 IoCs
Processes:
4B03.exe4B03.exeFCE1.exe1888.exeWerFault.exedescription pid process Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeDebugPrivilege 792 4B03.exe Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeDebugPrivilege 4992 4B03.exe Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeDebugPrivilege 2344 FCE1.exe Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeDebugPrivilege 1656 1888.exe Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeRestorePrivilege 2928 WerFault.exe Token: SeBackupPrivilege 2928 WerFault.exe Token: SeDebugPrivilege 2928 WerFault.exe Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 Token: SeShutdownPrivilege 372 Token: SeCreatePagefilePrivilege 372 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exeF85B.exe419C.exe4B03.exerhrtfofk.exedescription pid process target process PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 3716 wrote to memory of 2276 3716 c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe PID 372 wrote to memory of 4076 372 F85B.exe PID 372 wrote to memory of 4076 372 F85B.exe PID 372 wrote to memory of 4076 372 F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 4076 wrote to memory of 4472 4076 F85B.exe F85B.exe PID 372 wrote to memory of 708 372 1625.exe PID 372 wrote to memory of 708 372 1625.exe PID 372 wrote to memory of 708 372 1625.exe PID 372 wrote to memory of 4420 372 3585.exe PID 372 wrote to memory of 4420 372 3585.exe PID 372 wrote to memory of 4420 372 3585.exe PID 372 wrote to memory of 568 372 419C.exe PID 372 wrote to memory of 568 372 419C.exe PID 372 wrote to memory of 568 372 419C.exe PID 372 wrote to memory of 792 372 4B03.exe PID 372 wrote to memory of 792 372 4B03.exe PID 372 wrote to memory of 792 372 4B03.exe PID 568 wrote to memory of 1220 568 419C.exe cmd.exe PID 568 wrote to memory of 1220 568 419C.exe cmd.exe PID 568 wrote to memory of 1220 568 419C.exe cmd.exe PID 568 wrote to memory of 1512 568 419C.exe cmd.exe PID 568 wrote to memory of 1512 568 419C.exe cmd.exe PID 568 wrote to memory of 1512 568 419C.exe cmd.exe PID 568 wrote to memory of 1768 568 419C.exe sc.exe PID 568 wrote to memory of 1768 568 419C.exe sc.exe PID 568 wrote to memory of 1768 568 419C.exe sc.exe PID 792 wrote to memory of 2096 792 4B03.exe 4B03.exe PID 792 wrote to memory of 2096 792 4B03.exe 4B03.exe PID 792 wrote to memory of 2096 792 4B03.exe 4B03.exe PID 568 wrote to memory of 2204 568 419C.exe sc.exe PID 568 wrote to memory of 2204 568 419C.exe sc.exe PID 568 wrote to memory of 2204 568 419C.exe sc.exe PID 568 wrote to memory of 2596 568 419C.exe sc.exe PID 568 wrote to memory of 2596 568 419C.exe sc.exe PID 568 wrote to memory of 2596 568 419C.exe sc.exe PID 568 wrote to memory of 3832 568 419C.exe netsh.exe PID 568 wrote to memory of 3832 568 419C.exe netsh.exe PID 568 wrote to memory of 3832 568 419C.exe netsh.exe PID 792 wrote to memory of 4880 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4880 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4880 792 4B03.exe 4B03.exe PID 2700 wrote to memory of 1288 2700 rhrtfofk.exe svchost.exe PID 2700 wrote to memory of 1288 2700 rhrtfofk.exe svchost.exe PID 2700 wrote to memory of 1288 2700 rhrtfofk.exe svchost.exe PID 2700 wrote to memory of 1288 2700 rhrtfofk.exe svchost.exe PID 2700 wrote to memory of 1288 2700 rhrtfofk.exe svchost.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe PID 792 wrote to memory of 4992 792 4B03.exe 4B03.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe"C:\Users\Admin\AppData\Local\Temp\c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe"C:\Users\Admin\AppData\Local\Temp\c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59.exe"2⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\F85B.exeC:\Users\Admin\AppData\Local\Temp\F85B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\F85B.exeC:\Users\Admin\AppData\Local\Temp\F85B.exe2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1625.exeC:\Users\Admin\AppData\Local\Temp\1625.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\3585.exeC:\Users\Admin\AppData\Local\Temp\3585.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\419C.exeC:\Users\Admin\AppData\Local\Temp\419C.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\dxmpavoz\2⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rhrtfofk.exe" C:\Windows\SysWOW64\dxmpavoz\2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create dxmpavoz binPath= "C:\Windows\SysWOW64\dxmpavoz\rhrtfofk.exe /d\"C:\Users\Admin\AppData\Local\Temp\419C.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description dxmpavoz "wifi internet conection"2⤵
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start dxmpavoz2⤵
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeC:\Users\Admin\AppData\Local\Temp\4B03.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeC:\Users\Admin\AppData\Local\Temp\4B03.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeC:\Users\Admin\AppData\Local\Temp\4B03.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeC:\Users\Admin\AppData\Local\Temp\4B03.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\dxmpavoz\rhrtfofk.exeC:\Windows\SysWOW64\dxmpavoz\rhrtfofk.exe /d"C:\Users\Admin\AppData\Local\Temp\419C.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\BA68.exeC:\Users\Admin\AppData\Local\Temp\BA68.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\BA68.exe" & exit2⤵
-
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\D033.exeC:\Users\Admin\AppData\Local\Temp\D033.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 9642⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\FCE1.exeC:\Users\Admin\AppData\Local\Temp\FCE1.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1888.exeC:\Users\Admin\AppData\Local\Temp\1888.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\4B03.exe.logMD5
41fbed686f5700fc29aaccf83e8ba7fd
SHA15271bc29538f11e42a3b600c8dc727186e912456
SHA256df4e9d012687cdabd15e86bf37be15d6c822e1f50dde530a02468f0006586437
SHA512234b2235c1ced25810a4121c5eabcbf9f269e82c126a1adc363ee34478173f8b462e90eb53f5f11533641663350b90ec1e2360fd805b10c041fab12f4da7a034
-
C:\Users\Admin\AppData\Local\Temp\1625.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\1625.exeMD5
1f935bfff0f8128972bc69625e5b2a6c
SHA118db55c519bbe14311662a06faeecc97566e2afd
SHA2562bfa0884b172c9eaff7358741c164f571f0565389ab9cf99a8e0b90ae8ad914d
SHA5122c94c1ea43b008ce164d7cd22a2d0ff3b60a623017007a2f361bdff69ed72e97b0cc0897590be9cc56333e014cd003786741eb6bb7887590cb2aad832ea8a32d
-
C:\Users\Admin\AppData\Local\Temp\1888.exeMD5
b035525a5300eee5d055c90964923c0b
SHA1fc4ea5f2a58b7b70cd64f2ec0fb5cd2f1b0d8ed0
SHA2565e2e4e6fac056fa3b75d65f72d4a4dbc4827c68708e7788102a9539305211c53
SHA512c3358cfea800e1bdfe135758a8ae909c61ebe9a4f2e76f2bae3edbbd2830e6b0d0cc032f50a71d28d7bde2b3e3f1982a750b30f8c4098153000be8bc6c08d079
-
C:\Users\Admin\AppData\Local\Temp\1888.exeMD5
b035525a5300eee5d055c90964923c0b
SHA1fc4ea5f2a58b7b70cd64f2ec0fb5cd2f1b0d8ed0
SHA2565e2e4e6fac056fa3b75d65f72d4a4dbc4827c68708e7788102a9539305211c53
SHA512c3358cfea800e1bdfe135758a8ae909c61ebe9a4f2e76f2bae3edbbd2830e6b0d0cc032f50a71d28d7bde2b3e3f1982a750b30f8c4098153000be8bc6c08d079
-
C:\Users\Admin\AppData\Local\Temp\3585.exeMD5
2c7d8bc3ce456732a6f57a2ff89314ea
SHA1ca6e1a9b28fa9fd7db0cd10777f3a4322371db28
SHA256a8a19aa4689d5607f5a4986d75efdd9fa1a95bd5c3a43da5281927fe252fe523
SHA5125d70b2035efea89f597a50e538ef4bde9394f7e8f1b3dc0f241d91f1ff2392fd15330f26feabba4aef3b2a1d15c15bd075f4b271ece7fc284f27d25fc046bbd4
-
C:\Users\Admin\AppData\Local\Temp\3585.exeMD5
2c7d8bc3ce456732a6f57a2ff89314ea
SHA1ca6e1a9b28fa9fd7db0cd10777f3a4322371db28
SHA256a8a19aa4689d5607f5a4986d75efdd9fa1a95bd5c3a43da5281927fe252fe523
SHA5125d70b2035efea89f597a50e538ef4bde9394f7e8f1b3dc0f241d91f1ff2392fd15330f26feabba4aef3b2a1d15c15bd075f4b271ece7fc284f27d25fc046bbd4
-
C:\Users\Admin\AppData\Local\Temp\419C.exeMD5
0aec98d2607b1acc021cd53b2ed9b18a
SHA18764f47f1be455ae19d9505ba46554e171ca9fe8
SHA256786a9d31568df6a40968d5a401e0677e5bc985793d542ff143f9486bd0903feb
SHA512f70aaf4092bf7f861df817de635f989b6d7844011964e41f457df760ebf79979c68fb45fd0f61bc2d29f4d13c066fa828f0a4602503aa9882835a16ae876fe44
-
C:\Users\Admin\AppData\Local\Temp\419C.exeMD5
0aec98d2607b1acc021cd53b2ed9b18a
SHA18764f47f1be455ae19d9505ba46554e171ca9fe8
SHA256786a9d31568df6a40968d5a401e0677e5bc985793d542ff143f9486bd0903feb
SHA512f70aaf4092bf7f861df817de635f989b6d7844011964e41f457df760ebf79979c68fb45fd0f61bc2d29f4d13c066fa828f0a4602503aa9882835a16ae876fe44
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\4B03.exeMD5
9c40df5e45e0c3095f7b920664a902d3
SHA1795049f091e0d3a31e7b9c1091bd62bed71fb62e
SHA2567afbff30f47ab9d8e3fc2b67a72453161b93424f680c0caf270a57e05dd2478b
SHA5127c7da0d86ef8ff09f63d0b63812149bbb9482075547814739b1bf3211b8df4eb366fd9ee735907cf7946ada77479771422904a2bd121839eaebb33b431805eeb
-
C:\Users\Admin\AppData\Local\Temp\BA68.exeMD5
aec70ded586cfe6f9bae06560b0fe7a6
SHA18da695d69d3e3c3df85767b57c24f46576d1aeef
SHA256a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
SHA51214a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
-
C:\Users\Admin\AppData\Local\Temp\BA68.exeMD5
aec70ded586cfe6f9bae06560b0fe7a6
SHA18da695d69d3e3c3df85767b57c24f46576d1aeef
SHA256a1d583650ec7dc99e6c0c4009908358518a0be5fbe7cb6e2b3a50889bb5da3a1
SHA51214a2f13cb24652d0e3d230d5c05a90d9312ea26a7dacd81de9482fa87d7dab9b718c6af6be28ca7e747da156f136193b328cff662cd50d5f7fb8e684ead0edec
-
C:\Users\Admin\AppData\Local\Temp\D033.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\D033.exeMD5
c085684db882063c21f18d251679b0cc
SHA12b5e71123abdb276913e4438ad89f4ed1616950a
SHA256cda92bb8e0734752dc6366275020ce48d75f95d78af9793b40512895ecd2d470
SHA5128158aa6d5a6d2130b711671d3dac1a335b01d08118fb8ac91dc491ed17ee04cca8559b634edd4c03decbd8278709ad70db7fb0615df73f25d42242ea4b2555b7
-
C:\Users\Admin\AppData\Local\Temp\F85B.exeMD5
874b04fb066c89585b30aa4f1027753d
SHA1c012eddde35de134a16fada92bd665440af7d55f
SHA256c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59
SHA512cd379453d5885400c511d634c500c9ca7daf073885beba9fbd707f694d66c32c7d1e55010c350f784554bd17bf9e782ee12d1c930034eb0d8c824344523b109e
-
C:\Users\Admin\AppData\Local\Temp\F85B.exeMD5
874b04fb066c89585b30aa4f1027753d
SHA1c012eddde35de134a16fada92bd665440af7d55f
SHA256c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59
SHA512cd379453d5885400c511d634c500c9ca7daf073885beba9fbd707f694d66c32c7d1e55010c350f784554bd17bf9e782ee12d1c930034eb0d8c824344523b109e
-
C:\Users\Admin\AppData\Local\Temp\F85B.exeMD5
874b04fb066c89585b30aa4f1027753d
SHA1c012eddde35de134a16fada92bd665440af7d55f
SHA256c3b429eaf537bc99279318b08149948dcbfd09a9cc6b42d01ef635cb60e66f59
SHA512cd379453d5885400c511d634c500c9ca7daf073885beba9fbd707f694d66c32c7d1e55010c350f784554bd17bf9e782ee12d1c930034eb0d8c824344523b109e
-
C:\Users\Admin\AppData\Local\Temp\FCE1.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\FCE1.exeMD5
63eb415c553b5c2204f1bb46213b10c4
SHA1340e4b38773bf186749b0055c2ab3696efb61718
SHA2560e3e2247090efb74201b9aa5a5965cdf0b1b09edc4747bc0c3515f9a4bb46023
SHA51292fbd179c7902bdc197e493bb7f88aa1ebfe1c54910cf8f91bd0fb2ce4641caccde8cf1851eb09febadb71f18e62e600e4f20340c9a11ab18d90c450ba1d042b
-
C:\Users\Admin\AppData\Local\Temp\rhrtfofk.exeMD5
3916714319f52d2de0bbc6b569d1ff62
SHA157bbf3ae18e7e4256f437002506448b06040e922
SHA256dde6cdb42251cee0d549715e8a6a098f234b15d90d30cfbbc2f7b23a45db0c9d
SHA51266a415d9c297704179cdcc613b70300e46096db6d25ae60e537ae1c2d0e1c1c23cd586af8ac8a01303130f1b3c8f92f68c7880735ea5ed2c6bd5f493c92c3bc3
-
C:\Windows\SysWOW64\dxmpavoz\rhrtfofk.exeMD5
3916714319f52d2de0bbc6b569d1ff62
SHA157bbf3ae18e7e4256f437002506448b06040e922
SHA256dde6cdb42251cee0d549715e8a6a098f234b15d90d30cfbbc2f7b23a45db0c9d
SHA51266a415d9c297704179cdcc613b70300e46096db6d25ae60e537ae1c2d0e1c1c23cd586af8ac8a01303130f1b3c8f92f68c7880735ea5ed2c6bd5f493c92c3bc3
-
\ProgramData\mozglue.dllMD5
8f73c08a9660691143661bf7332c3c27
SHA137fa65dd737c50fda710fdbde89e51374d0c204a
SHA2563fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd
SHA5120042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89
-
\ProgramData\nss3.dllMD5
bfac4e3c5908856ba17d41edcd455a51
SHA18eec7e888767aa9e4cca8ff246eb2aacb9170428
SHA256e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78
SHA5122565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66
-
\ProgramData\sqlite3.dllMD5
e477a96c8f2b18d6b5c27bde49c990bf
SHA1e980c9bf41330d1e5bd04556db4646a0210f7409
SHA25616574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660
SHA512335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c
-
memory/372-128-0x00000000033A0000-0x00000000033B6000-memory.dmpFilesize
88KB
-
memory/372-119-0x00000000012F0000-0x0000000001306000-memory.dmpFilesize
88KB
-
memory/372-135-0x0000000003420000-0x0000000003436000-memory.dmpFilesize
88KB
-
memory/568-155-0x0000000000400000-0x0000000002B83000-memory.dmpFilesize
39.5MB
-
memory/568-146-0x0000000002CE0000-0x0000000002E2A000-memory.dmpFilesize
1.3MB
-
memory/568-145-0x0000000002CB0000-0x0000000002CBD000-memory.dmpFilesize
52KB
-
memory/568-142-0x0000000000000000-mapping.dmp
-
memory/708-129-0x0000000000000000-mapping.dmp
-
memory/708-133-0x0000000000030000-0x0000000000039000-memory.dmpFilesize
36KB
-
memory/708-134-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/792-151-0x0000000000BF0000-0x0000000000C7A000-memory.dmpFilesize
552KB
-
memory/792-157-0x0000000001420000-0x0000000001421000-memory.dmpFilesize
4KB
-
memory/792-156-0x0000000005530000-0x0000000005531000-memory.dmpFilesize
4KB
-
memory/792-154-0x0000000005440000-0x000000000545E000-memory.dmpFilesize
120KB
-
memory/792-153-0x0000000005540000-0x00000000055B6000-memory.dmpFilesize
472KB
-
memory/792-161-0x0000000005CD0000-0x00000000061CE000-memory.dmpFilesize
5.0MB
-
memory/792-147-0x0000000000000000-mapping.dmp
-
memory/792-150-0x0000000000BF0000-0x0000000000C7A000-memory.dmpFilesize
552KB
-
memory/1220-152-0x0000000000000000-mapping.dmp
-
memory/1288-169-0x00000000010F9A6B-mapping.dmp
-
memory/1288-168-0x00000000010F0000-0x0000000001105000-memory.dmpFilesize
84KB
-
memory/1288-170-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB
-
memory/1288-171-0x0000000001000000-0x0000000001001000-memory.dmpFilesize
4KB
-
memory/1436-214-0x0000000000000000-mapping.dmp
-
memory/1436-216-0x0000000000780000-0x000000000078C000-memory.dmpFilesize
48KB
-
memory/1436-215-0x0000000000790000-0x0000000000797000-memory.dmpFilesize
28KB
-
memory/1512-158-0x0000000000000000-mapping.dmp
-
memory/1656-262-0x0000000076130000-0x0000000077478000-memory.dmpFilesize
19.3MB
-
memory/1656-249-0x0000000000A10000-0x0000000000A11000-memory.dmpFilesize
4KB
-
memory/1656-265-0x0000000073920000-0x000000007396B000-memory.dmpFilesize
300KB
-
memory/1656-245-0x0000000000000000-mapping.dmp
-
memory/1656-248-0x0000000000DA0000-0x0000000000E81000-memory.dmpFilesize
900KB
-
memory/1656-250-0x0000000075B80000-0x0000000075D42000-memory.dmpFilesize
1.8MB
-
memory/1656-259-0x0000000074A30000-0x0000000074FB4000-memory.dmpFilesize
5.5MB
-
memory/1656-254-0x0000000073A70000-0x0000000073AF0000-memory.dmpFilesize
512KB
-
memory/1656-251-0x0000000075D50000-0x0000000075E41000-memory.dmpFilesize
964KB
-
memory/1768-160-0x0000000000000000-mapping.dmp
-
memory/2204-162-0x0000000000000000-mapping.dmp
-
memory/2224-217-0x0000000000000000-mapping.dmp
-
memory/2276-115-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/2276-116-0x0000000000402F47-mapping.dmp
-
memory/2344-240-0x0000000004C30000-0x0000000004C6E000-memory.dmpFilesize
248KB
-
memory/2344-238-0x0000000002670000-0x0000000002682000-memory.dmpFilesize
72KB
-
memory/2344-243-0x0000000004C83000-0x0000000004C84000-memory.dmpFilesize
4KB
-
memory/2344-242-0x0000000004C82000-0x0000000004C83000-memory.dmpFilesize
4KB
-
memory/2344-241-0x00000000057A0000-0x00000000057EB000-memory.dmpFilesize
300KB
-
memory/2344-227-0x0000000000000000-mapping.dmp
-
memory/2344-239-0x0000000004B20000-0x0000000004C2A000-memory.dmpFilesize
1.0MB
-
memory/2344-233-0x0000000002210000-0x0000000002244000-memory.dmpFilesize
208KB
-
memory/2344-231-0x00000000001C0000-0x00000000001F9000-memory.dmpFilesize
228KB
-
memory/2344-232-0x0000000000400000-0x000000000047B000-memory.dmpFilesize
492KB
-
memory/2344-237-0x0000000005190000-0x0000000005796000-memory.dmpFilesize
6.0MB
-
memory/2344-236-0x0000000002360000-0x0000000002392000-memory.dmpFilesize
200KB
-
memory/2344-235-0x0000000004C90000-0x000000000518E000-memory.dmpFilesize
5.0MB
-
memory/2344-234-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/2596-163-0x0000000000000000-mapping.dmp
-
memory/2700-172-0x0000000000400000-0x0000000002B83000-memory.dmpFilesize
39.5MB
-
memory/2700-167-0x0000000002CE0000-0x0000000002E2A000-memory.dmpFilesize
1.3MB
-
memory/3716-117-0x0000000002C60000-0x0000000002C69000-memory.dmpFilesize
36KB
-
memory/3716-118-0x0000000002E00000-0x0000000002E09000-memory.dmpFilesize
36KB
-
memory/3832-165-0x0000000000000000-mapping.dmp
-
memory/4076-126-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/4076-120-0x0000000000000000-mapping.dmp
-
memory/4076-127-0x0000000002B80000-0x0000000002CCA000-memory.dmpFilesize
1.3MB
-
memory/4420-141-0x0000000000400000-0x0000000002B87000-memory.dmpFilesize
39.5MB
-
memory/4420-140-0x0000000002DE0000-0x0000000002DFC000-memory.dmpFilesize
112KB
-
memory/4420-136-0x0000000000000000-mapping.dmp
-
memory/4420-139-0x0000000002DC0000-0x0000000002DD1000-memory.dmpFilesize
68KB
-
memory/4472-124-0x0000000000402F47-mapping.dmp
-
memory/4568-218-0x0000000000000000-mapping.dmp
-
memory/4724-211-0x0000000000AF0000-0x0000000000B5B000-memory.dmpFilesize
428KB
-
memory/4724-210-0x0000000000B60000-0x0000000000BD4000-memory.dmpFilesize
464KB
-
memory/4724-209-0x0000000000000000-mapping.dmp
-
memory/4992-185-0x0000000004D60000-0x0000000005366000-memory.dmpFilesize
6.0MB
-
memory/4992-192-0x0000000006F50000-0x000000000747C000-memory.dmpFilesize
5.2MB
-
memory/4992-174-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4992-175-0x0000000000419192-mapping.dmp
-
memory/4992-178-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4992-179-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/4992-180-0x0000000005370000-0x0000000005976000-memory.dmpFilesize
6.0MB
-
memory/4992-181-0x0000000004D80000-0x0000000004D92000-memory.dmpFilesize
72KB
-
memory/4992-182-0x0000000004EB0000-0x0000000004FBA000-memory.dmpFilesize
1.0MB
-
memory/4992-183-0x0000000004DE0000-0x0000000004E1E000-memory.dmpFilesize
248KB
-
memory/4992-184-0x0000000004E20000-0x0000000004E6B000-memory.dmpFilesize
300KB
-
memory/4992-186-0x0000000005160000-0x00000000051D6000-memory.dmpFilesize
472KB
-
memory/4992-187-0x0000000005280000-0x0000000005312000-memory.dmpFilesize
584KB
-
memory/4992-188-0x0000000005E80000-0x000000000637E000-memory.dmpFilesize
5.0MB
-
memory/4992-189-0x0000000005240000-0x000000000525E000-memory.dmpFilesize
120KB
-
memory/4992-190-0x0000000005A30000-0x0000000005A96000-memory.dmpFilesize
408KB
-
memory/4992-191-0x0000000006850000-0x0000000006A12000-memory.dmpFilesize
1.8MB
-
memory/4996-197-0x0000000000B30000-0x0000000000C90000-memory.dmpFilesize
1.4MB
-
memory/4996-201-0x00000000009D0000-0x0000000000A16000-memory.dmpFilesize
280KB
-
memory/4996-193-0x0000000000000000-mapping.dmp
-
memory/4996-196-0x0000000000B30000-0x0000000000C90000-memory.dmpFilesize
1.4MB
-
memory/4996-198-0x0000000000B30000-0x0000000000C90000-memory.dmpFilesize
1.4MB
-
memory/4996-199-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/4996-200-0x0000000075B80000-0x0000000075D42000-memory.dmpFilesize
1.8MB
-
memory/5096-205-0x0000000000AE3000-0x0000000000B57000-memory.dmpFilesize
464KB
-
memory/5096-202-0x0000000000000000-mapping.dmp
-
memory/5096-219-0x0000000000B5C000-0x0000000000BB9000-memory.dmpFilesize
372KB
-
memory/5096-206-0x0000000000A10000-0x0000000000AA7000-memory.dmpFilesize
604KB
-
memory/5096-207-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/5096-226-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/5096-225-0x0000000002710000-0x00000000027A2000-memory.dmpFilesize
584KB
-
memory/5096-224-0x00000000025D0000-0x0000000002620000-memory.dmpFilesize
320KB
-
memory/5096-223-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/5096-222-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB
-
memory/5096-221-0x0000000002670000-0x0000000002705000-memory.dmpFilesize
596KB
-
memory/5096-220-0x0000000000400000-0x0000000000885000-memory.dmpFilesize
4.5MB