Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 07:46
Static task
static1
Behavioral task
behavioral1
Sample
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
Resource
win10v2004-20220414-en
General
-
Target
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe
-
Size
28.0MB
-
MD5
05b666fa594fabf1f40b331f75609091
-
SHA1
9ea91b4d0e830bedaa11bcb3835c415527035692
-
SHA256
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea
-
SHA512
e3bb4a1833759acd5987c72954df220a3c49e9671412d28ff29a0397cf881aabab9c23e1689fe6bc94d8831287c082b4b94668653d9751abd3235f3fa7c410f7
Malware Config
Extracted
amadey
3.07
89.163.249.231/panel/index.php
Signatures
-
Executes dropped EXE 9 IoCs
Processes:
service32.exeservices32.exesvchost32.exetskill.exewindows_7_extreme.exeftewk.exeftewk.exeftewk.exeftewk.exepid process 876 service32.exe 2000 services32.exe 1124 svchost32.exe 1952 tskill.exe 1720 windows_7_extreme.exe 1884 ftewk.exe 560 ftewk.exe 2028 ftewk.exe 1060 ftewk.exe -
Modifies Windows Firewall 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
windows_7_extreme.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation windows_7_extreme.exe -
Loads dropped DLL 24 IoCs
Processes:
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exetskill.exepid process 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe 1952 tskill.exe 1952 tskill.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
svchost32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce svchost32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\svchost32.exe = "C:\\Users\\Admin\\svchost32.exe" svchost32.exe -
Enumerates connected drives 3 TTPs 49 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
windows_7_extreme.exedescription ioc process File opened (read-only) \??\G: windows_7_extreme.exe File opened (read-only) \??\K: windows_7_extreme.exe File opened (read-only) \??\o: windows_7_extreme.exe File opened (read-only) \??\O: windows_7_extreme.exe File opened (read-only) \??\v: windows_7_extreme.exe File opened (read-only) \??\x: windows_7_extreme.exe File opened (read-only) \??\z: windows_7_extreme.exe File opened (read-only) \??\A: windows_7_extreme.exe File opened (read-only) \??\H: windows_7_extreme.exe File opened (read-only) \??\n: windows_7_extreme.exe File opened (read-only) \??\Q: windows_7_extreme.exe File opened (read-only) \??\S: windows_7_extreme.exe File opened (read-only) \??\V: windows_7_extreme.exe File opened (read-only) \??\b: windows_7_extreme.exe File opened (read-only) \??\f: windows_7_extreme.exe File opened (read-only) \??\F: windows_7_extreme.exe File opened (read-only) \??\h: windows_7_extreme.exe File opened (read-only) \??\J: windows_7_extreme.exe File opened (read-only) \??\k: windows_7_extreme.exe File opened (read-only) \??\w: windows_7_extreme.exe File opened (read-only) \??\D: windows_7_extreme.exe File opened (read-only) \??\I: windows_7_extreme.exe File opened (read-only) \??\m: windows_7_extreme.exe File opened (read-only) \??\p: windows_7_extreme.exe File opened (read-only) \??\R: windows_7_extreme.exe File opened (read-only) \??\t: windows_7_extreme.exe File opened (read-only) \??\Y: windows_7_extreme.exe File opened (read-only) \??\Z: windows_7_extreme.exe File opened (read-only) \??\a: windows_7_extreme.exe File opened (read-only) \??\i: windows_7_extreme.exe File opened (read-only) \??\l: windows_7_extreme.exe File opened (read-only) \??\L: windows_7_extreme.exe File opened (read-only) \??\u: windows_7_extreme.exe File opened (read-only) \??\y: windows_7_extreme.exe File opened (read-only) \??\e: windows_7_extreme.exe File opened (read-only) \??\M: windows_7_extreme.exe File opened (read-only) \??\N: windows_7_extreme.exe File opened (read-only) \??\W: windows_7_extreme.exe File opened (read-only) \??\E: windows_7_extreme.exe File opened (read-only) \??\j: windows_7_extreme.exe File opened (read-only) \??\P: windows_7_extreme.exe File opened (read-only) \??\s: windows_7_extreme.exe File opened (read-only) \??\T: windows_7_extreme.exe File opened (read-only) \??\U: windows_7_extreme.exe File opened (read-only) \??\B: windows_7_extreme.exe File opened (read-only) \??\g: windows_7_extreme.exe File opened (read-only) \??\q: windows_7_extreme.exe File opened (read-only) \??\r: windows_7_extreme.exe File opened (read-only) \??\X: windows_7_extreme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1828 2000 WerFault.exe services32.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
svchost32.exepid process 1124 svchost32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.execonhost.exetskill.exetskill.exewindows_7_extreme.exetskill.exetskill.exeDllHost.exetskill.exetskill.exetskill.exetskill.exetskill.exetskill.exepid process 1472 tskill.exe 1472 tskill.exe 1864 tskill.exe 1864 tskill.exe 1912 tskill.exe 1912 tskill.exe 1940 tskill.exe 1940 tskill.exe 1916 tskill.exe 1916 tskill.exe 1948 tskill.exe 1948 tskill.exe 320 tskill.exe 320 tskill.exe 740 tskill.exe 740 tskill.exe 1244 tskill.exe 1244 tskill.exe 276 tskill.exe 276 tskill.exe 1116 tskill.exe 1116 tskill.exe 1184 tskill.exe 1184 tskill.exe 1628 tskill.exe 1628 tskill.exe 676 tskill.exe 676 tskill.exe 1488 tskill.exe 1488 tskill.exe 1540 tskill.exe 1540 tskill.exe 1748 tskill.exe 1748 tskill.exe 992 conhost.exe 992 conhost.exe 888 tskill.exe 888 tskill.exe 1092 tskill.exe 1092 tskill.exe 1720 windows_7_extreme.exe 1720 windows_7_extreme.exe 2020 tskill.exe 2020 tskill.exe 1720 windows_7_extreme.exe 1704 tskill.exe 1704 tskill.exe 1720 windows_7_extreme.exe 1720 windows_7_extreme.exe 1720 windows_7_extreme.exe 572 DllHost.exe 572 DllHost.exe 1692 tskill.exe 1692 tskill.exe 1676 tskill.exe 1676 tskill.exe 1536 tskill.exe 1536 tskill.exe 1904 tskill.exe 1904 tskill.exe 2012 tskill.exe 2012 tskill.exe 648 tskill.exe 648 tskill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
windows_7_extreme.exedescription pid process Token: SeSecurityPrivilege 1720 windows_7_extreme.exe Token: SeTakeOwnershipPrivilege 1720 windows_7_extreme.exe Token: SeRestorePrivilege 1720 windows_7_extreme.exe Token: SeBackupPrivilege 1720 windows_7_extreme.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exeservice32.execmd.exenet.exedescription pid process target process PID 532 wrote to memory of 876 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe service32.exe PID 532 wrote to memory of 876 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe service32.exe PID 532 wrote to memory of 876 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe service32.exe PID 532 wrote to memory of 876 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe service32.exe PID 876 wrote to memory of 1636 876 service32.exe cmd.exe PID 876 wrote to memory of 1636 876 service32.exe cmd.exe PID 876 wrote to memory of 1636 876 service32.exe cmd.exe PID 876 wrote to memory of 1636 876 service32.exe cmd.exe PID 532 wrote to memory of 2000 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe services32.exe PID 532 wrote to memory of 2000 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe services32.exe PID 532 wrote to memory of 2000 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe services32.exe PID 532 wrote to memory of 2000 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe services32.exe PID 1636 wrote to memory of 1016 1636 cmd.exe net.exe PID 1636 wrote to memory of 1016 1636 cmd.exe net.exe PID 1636 wrote to memory of 1016 1636 cmd.exe net.exe PID 1016 wrote to memory of 1744 1016 net.exe net1.exe PID 1016 wrote to memory of 1744 1016 net.exe net1.exe PID 1016 wrote to memory of 1744 1016 net.exe net1.exe PID 532 wrote to memory of 1124 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe svchost32.exe PID 532 wrote to memory of 1124 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe svchost32.exe PID 532 wrote to memory of 1124 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe svchost32.exe PID 532 wrote to memory of 1124 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe svchost32.exe PID 1636 wrote to memory of 1776 1636 cmd.exe netsh.exe PID 1636 wrote to memory of 1776 1636 cmd.exe netsh.exe PID 1636 wrote to memory of 1776 1636 cmd.exe netsh.exe PID 532 wrote to memory of 1952 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe tskill.exe PID 532 wrote to memory of 1952 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe tskill.exe PID 532 wrote to memory of 1952 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe tskill.exe PID 532 wrote to memory of 1952 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe tskill.exe PID 1636 wrote to memory of 1472 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1472 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1472 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1864 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1864 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1864 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1912 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1912 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1912 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1940 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1940 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1940 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1916 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1916 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1916 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1948 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1948 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1948 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 320 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 320 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 320 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 740 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 740 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 740 1636 cmd.exe tskill.exe PID 532 wrote to memory of 1720 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe windows_7_extreme.exe PID 532 wrote to memory of 1720 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe windows_7_extreme.exe PID 532 wrote to memory of 1720 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe windows_7_extreme.exe PID 532 wrote to memory of 1720 532 e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe windows_7_extreme.exe PID 1636 wrote to memory of 1244 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1244 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1244 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 276 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 276 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 276 1636 cmd.exe tskill.exe PID 1636 wrote to memory of 1116 1636 cmd.exe tskill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe"C:\Users\Admin\AppData\Local\Temp\e58a84a6bab73181723f3df7a8f931785acfa2e7134f45f95afa5e0be81dd1ea.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\service32.exe"C:\Users\Admin\service32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1DCE.tmp\1DCF.tmp\1DD0.bat C:\Users\Admin\service32.exe"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet stop ???Security Center???4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ???Security Center???5⤵
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
-
C:\Windows\system32\tskill.exetskill /A av*4⤵
-
C:\Windows\system32\tskill.exetskill /A fire*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A anti*4⤵
-
C:\Windows\system32\tskill.exetskill /A spy*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A bullguard4⤵
-
C:\Windows\system32\tskill.exetskill /A PersFw4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A KAV*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A ZONEALARM4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A SAFEWEB4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A bullguard4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A PersFw4⤵
-
C:\Windows\system32\tskill.exetskill /A spy*4⤵
-
C:\Windows\system32\tskill.exetskill /A KAV*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A ZONEALARM4⤵
-
C:\Windows\system32\tskill.exetskill /A SAFEWEB4⤵
-
C:\Windows\system32\tskill.exetskill /A OUTPOST4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A nv*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A nav*4⤵
-
C:\Windows\system32\tskill.exetskill /A F-*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A ESAFE4⤵
-
C:\Windows\system32\tskill.exetskill /A cle4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A BLACKICE4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A def*4⤵
-
C:\Windows\system32\tskill.exetskill /A kav4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A kav*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A avg*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A ash*4⤵
-
C:\Windows\system32\tskill.exetskill /A aswupdsv4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A ewid*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A guard*4⤵
-
C:\Windows\system32\tskill.exetskill /A guar*4⤵
-
C:\Windows\system32\tskill.exetskill /A gcasDt*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A msmp*4⤵
-
C:\Windows\system32\tskill.exetskill /A mcafe*4⤵
-
C:\Windows\system32\tskill.exetskill /A mghtml4⤵
-
C:\Windows\system32\tskill.exetskill /A msiexec4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A outpost4⤵
-
C:\Windows\system32\tskill.exetskill /A isafe4⤵
-
C:\Windows\system32\tskill.exetskill /A zap*cls4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A zauinst4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A upd*4⤵
-
C:\Windows\system32\tskill.exetskill /A zlclien*4⤵
-
C:\Windows\system32\tskill.exetskill /A minilog4⤵
-
C:\Windows\system32\tskill.exetskill /A cc*4⤵
-
C:\Windows\system32\tskill.exetskill /A norton*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A norton au*4⤵
-
C:\Windows\system32\tskill.exetskill /A ccc*4⤵
-
C:\Windows\system32\tskill.exetskill /A npfmn*4⤵
-
C:\Windows\system32\tskill.exetskill /A loge*4⤵
-
C:\Windows\system32\tskill.exetskill /A nisum*4⤵
-
C:\Windows\system32\tskill.exetskill /A issvc4⤵
-
C:\Windows\system32\tskill.exetskill /A tmp*4⤵
-
C:\Windows\system32\tskill.exetskill /A tmn*4⤵
-
C:\Windows\system32\tskill.exetskill /A pcc*4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\tskill.exetskill /A cpd*4⤵
-
C:\Windows\system32\tskill.exetskill /A pop*4⤵
-
C:\Windows\system32\tskill.exetskill /A pav*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A padmincls4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A panda*4⤵
-
C:\Windows\system32\tskill.exetskill /A avsch*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tskill.exetskill /A sche*4⤵
-
C:\Windows\system32\tskill.exetskill /A syman*4⤵
-
C:\Windows\system32\tskill.exetskill /A realm*cls4⤵
-
C:\Windows\system32\tskill.exetskill /A virus*4⤵
-
C:\Windows\system32\tskill.exetskill /A sweep*4⤵
-
C:\Windows\system32\tskill.exetskill /A scan*4⤵
-
C:\Windows\system32\tskill.exetskill /A ad-*4⤵
-
C:\Windows\system32\tskill.exetskill /A safe*4⤵
-
C:\Windows\system32\tskill.exetskill /A avas*4⤵
-
C:\Windows\system32\tskill.exetskill /A norm*4⤵
-
C:\Windows\system32\tskill.exetskill /A offg*4⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\services32.exe"C:\Users\Admin\services32.exe"2⤵
- Executes dropped EXE
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2000 -s 5363⤵
- Program crash
-
C:\Users\Admin\svchost32.exe"C:\Users\Admin\svchost32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
-
C:\Users\Admin\system32.exe"C:\Users\Admin\system32.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe"C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\4186feeda5\4⤵
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /f /v Startup /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\4186feeda5\5⤵
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN ftewk.exe /TR "C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Users\Admin\windows_7_extreme.exe"C:\Users\Admin\windows_7_extreme.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1101231411993427877377340430817169-213788621-999921125-696686631678737269"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-18222196911364053793-56670270811428321347980291917964612721387986008123035675"1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\taskeng.exetaskeng.exe {97502D14-C0CA-4882-AB24-665674A0B48A} S-1-5-21-1819626980-2277161760-1023733287-1000:TBHNEBSE\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeC:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeC:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeC:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1DCE.tmp\1DCF.tmp\1DD0.batFilesize
2KB
MD57705e93746d9943208b5b2eec0ab7894
SHA191784e04b65c3ff0c8ffd940ea5928cb7153119d
SHA256c761e7ee00239460bba3b0ba8b1cde6d32adba765465aff2fd97a3aac7be6789
SHA5124255d61bf217b7217badb317fbf14a3e0a835d5f54f44a34b7256953c464bc68858b0dd6df7406430e71b4b9065580c134537c60515871991ab65b08106e622d
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\service32.exeFilesize
99KB
MD5adfe04204c8ffee48851fb7b1770a407
SHA1b0db70c025b899fee56a1544111f2660100aa449
SHA2567d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba
SHA512a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab
-
C:\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
C:\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
C:\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
C:\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
C:\Users\Admin\windows_7_extreme.exeFilesize
26.8MB
MD58f9ccbdb647d6a7ff0c693a2700727aa
SHA15a703b7fd91ade87e63ecfe890e49761d596b1eb
SHA2569df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d
SHA5121a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c
-
\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\AppData\Local\Temp\4186feeda5\ftewk.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\service32.exeFilesize
99KB
MD5adfe04204c8ffee48851fb7b1770a407
SHA1b0db70c025b899fee56a1544111f2660100aa449
SHA2567d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba
SHA512a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab
-
\Users\Admin\service32.exeFilesize
99KB
MD5adfe04204c8ffee48851fb7b1770a407
SHA1b0db70c025b899fee56a1544111f2660100aa449
SHA2567d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba
SHA512a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab
-
\Users\Admin\service32.exeFilesize
99KB
MD5adfe04204c8ffee48851fb7b1770a407
SHA1b0db70c025b899fee56a1544111f2660100aa449
SHA2567d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba
SHA512a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab
-
\Users\Admin\service32.exeFilesize
99KB
MD5adfe04204c8ffee48851fb7b1770a407
SHA1b0db70c025b899fee56a1544111f2660100aa449
SHA2567d7fb8d26e3a8cf4d2bf48f1ec3ca95443cb34c48167057395ec0fddf1ecc4ba
SHA512a1a8a8d859d9d85fbb8bfc4cd249a71608e90e35bf692fb88746e5084ccc2f10ffc50eceb67aff4c8f7853aa96010d91fc72d7d0f6c26ba2f6e74ec5eb2ec9ab
-
\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
\Users\Admin\services32.exeFilesize
40KB
MD59fec413d7e5cb7dd9ddac94988a1b222
SHA1416e0310942f5f0c9d87e8ba50ea916cd8364c0f
SHA2566cf4fd07962aa1ca5df3f2b05462eb561a09f4419fbcdaaafbd9ff7e965e1ce4
SHA51251d42b8cadac3c863d6403b3360e8f7942e77cb8817767dcbe2096475d114568272bd4f22110aa5fd4cf3330fc69fcc5f71094624554da956698d7662a746f66
-
\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
\Users\Admin\svchost32.exeFilesize
548KB
MD500f0626488ae3052737b0620ec73f62c
SHA13315c50c894cec9298b1021015df22b99fb2678b
SHA2567b8bbaab3614d71120895c684feebb5e0ecda47367fa967e7133966744ba575b
SHA512a1d5ba849c866426e3760725d113e0c31fdff30c9b2c6a0391320c49df0d060f851d88fb9be1220b8c99a6ca88442b520159709ea49acd3175bc4ff9f327b3bb
-
\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\system32.exeFilesize
326KB
MD538affbc2e16fc5da92cca17ddc669372
SHA124d9518d25853552b496ce5626913eaf44f1ae9a
SHA2564a411282069d6c0a4f7279147f528d55d27caac45cd48ca7d705f517f0cc0d6f
SHA512fbcb551eb0d9b762e9ec788f60c6bb628586826fecdcd98c5270da3af7239c2f5f3ae61085b838462be089fa07a04a7d45062bc9b5925549a9012138adbfcb51
-
\Users\Admin\windows_7_extreme.exeFilesize
26.8MB
MD58f9ccbdb647d6a7ff0c693a2700727aa
SHA15a703b7fd91ade87e63ecfe890e49761d596b1eb
SHA2569df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d
SHA5121a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c
-
\Users\Admin\windows_7_extreme.exeFilesize
26.8MB
MD58f9ccbdb647d6a7ff0c693a2700727aa
SHA15a703b7fd91ade87e63ecfe890e49761d596b1eb
SHA2569df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d
SHA5121a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c
-
\Users\Admin\windows_7_extreme.exeFilesize
26.8MB
MD58f9ccbdb647d6a7ff0c693a2700727aa
SHA15a703b7fd91ade87e63ecfe890e49761d596b1eb
SHA2569df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d
SHA5121a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c
-
\Users\Admin\windows_7_extreme.exeFilesize
26.8MB
MD58f9ccbdb647d6a7ff0c693a2700727aa
SHA15a703b7fd91ade87e63ecfe890e49761d596b1eb
SHA2569df418c9b62ae059279babe614a6649d7a714ef12c06f11f104f33155d7a2b7d
SHA5121a2311734d5bfffd951fc89a0970c05b46b8fce46e1de86e1d47fcd83e443740dd64a0d08acbc70969deb8ae5dd993c4d358c47ad0b90e3e60d32b5e23bfb10c
-
memory/276-146-0x0000000000000000-mapping.dmp
-
memory/276-104-0x0000000000000000-mapping.dmp
-
memory/320-96-0x0000000000000000-mapping.dmp
-
memory/532-54-0x0000000075701000-0x0000000075703000-memory.dmpFilesize
8KB
-
memory/560-145-0x0000000000000000-mapping.dmp
-
memory/560-170-0x00000000005EE000-0x000000000060C000-memory.dmpFilesize
120KB
-
memory/560-171-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/564-143-0x0000000000000000-mapping.dmp
-
memory/572-129-0x0000000000000000-mapping.dmp
-
memory/648-139-0x0000000000000000-mapping.dmp
-
memory/676-149-0x0000000000000000-mapping.dmp
-
memory/676-113-0x0000000000000000-mapping.dmp
-
memory/740-97-0x0000000000000000-mapping.dmp
-
memory/876-59-0x0000000000000000-mapping.dmp
-
memory/888-119-0x0000000000000000-mapping.dmp
-
memory/912-151-0x0000000000000000-mapping.dmp
-
memory/976-154-0x0000000000000000-mapping.dmp
-
memory/992-117-0x0000000000000000-mapping.dmp
-
memory/1016-71-0x0000000000000000-mapping.dmp
-
memory/1060-178-0x000000000028E000-0x00000000002AC000-memory.dmpFilesize
120KB
-
memory/1060-179-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1092-155-0x0000000000000000-mapping.dmp
-
memory/1092-121-0x0000000000000000-mapping.dmp
-
memory/1116-110-0x0000000000000000-mapping.dmp
-
memory/1124-78-0x0000000000000000-mapping.dmp
-
memory/1124-107-0x00000000005BC000-0x00000000005FB000-memory.dmpFilesize
252KB
-
memory/1124-109-0x0000000000400000-0x000000000050C000-memory.dmpFilesize
1.0MB
-
memory/1124-108-0x00000000002C0000-0x0000000000307000-memory.dmpFilesize
284KB
-
memory/1184-148-0x0000000000000000-mapping.dmp
-
memory/1184-111-0x0000000000000000-mapping.dmp
-
memory/1244-103-0x0000000000000000-mapping.dmp
-
memory/1316-147-0x0000000000000000-mapping.dmp
-
memory/1440-152-0x0000000000000000-mapping.dmp
-
memory/1472-90-0x0000000000000000-mapping.dmp
-
memory/1488-150-0x0000000000000000-mapping.dmp
-
memory/1488-114-0x0000000000000000-mapping.dmp
-
memory/1496-141-0x0000000000000000-mapping.dmp
-
memory/1520-144-0x0000000000000000-mapping.dmp
-
memory/1536-136-0x0000000000000000-mapping.dmp
-
memory/1540-115-0x0000000000000000-mapping.dmp
-
memory/1568-163-0x0000000000000000-mapping.dmp
-
memory/1584-161-0x0000000000000000-mapping.dmp
-
memory/1628-112-0x0000000000000000-mapping.dmp
-
memory/1636-62-0x0000000000000000-mapping.dmp
-
memory/1676-135-0x0000000000000000-mapping.dmp
-
memory/1684-159-0x0000000000000000-mapping.dmp
-
memory/1692-133-0x0000000000000000-mapping.dmp
-
memory/1704-127-0x0000000000000000-mapping.dmp
-
memory/1720-102-0x0000000000000000-mapping.dmp
-
memory/1720-120-0x00000000741F0000-0x0000000074320000-memory.dmpFilesize
1.2MB
-
memory/1744-72-0x0000000000000000-mapping.dmp
-
memory/1748-116-0x0000000000000000-mapping.dmp
-
memory/1776-81-0x000007FEFB7D1000-0x000007FEFB7D3000-memory.dmpFilesize
8KB
-
memory/1776-79-0x0000000000000000-mapping.dmp
-
memory/1828-118-0x0000000000000000-mapping.dmp
-
memory/1864-91-0x0000000000000000-mapping.dmp
-
memory/1876-162-0x0000000000000000-mapping.dmp
-
memory/1880-153-0x0000000000000000-mapping.dmp
-
memory/1884-166-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1884-165-0x00000000005BE000-0x00000000005DC000-memory.dmpFilesize
120KB
-
memory/1884-132-0x0000000000000000-mapping.dmp
-
memory/1904-137-0x0000000000000000-mapping.dmp
-
memory/1912-140-0x0000000000000000-mapping.dmp
-
memory/1912-92-0x0000000000000000-mapping.dmp
-
memory/1916-94-0x0000000000000000-mapping.dmp
-
memory/1916-142-0x0000000000000000-mapping.dmp
-
memory/1940-93-0x0000000000000000-mapping.dmp
-
memory/1948-95-0x0000000000000000-mapping.dmp
-
memory/1952-124-0x000000000050E000-0x000000000052B000-memory.dmpFilesize
116KB
-
memory/1952-125-0x00000000002E0000-0x0000000000318000-memory.dmpFilesize
224KB
-
memory/1952-126-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/1952-87-0x0000000000000000-mapping.dmp
-
memory/1992-158-0x0000000000000000-mapping.dmp
-
memory/2000-89-0x0000000000880000-0x000000000088E000-memory.dmpFilesize
56KB
-
memory/2000-67-0x0000000000000000-mapping.dmp
-
memory/2012-138-0x0000000000000000-mapping.dmp
-
memory/2016-160-0x0000000000000000-mapping.dmp
-
memory/2020-122-0x0000000000000000-mapping.dmp
-
memory/2028-175-0x0000000000400000-0x0000000000480000-memory.dmpFilesize
512KB
-
memory/2028-174-0x000000000052E000-0x000000000054C000-memory.dmpFilesize
120KB
-
memory/2040-156-0x0000000000000000-mapping.dmp
-
memory/2044-157-0x0000000000000000-mapping.dmp