Analysis
-
max time kernel
162s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 06:58
Static task
static1
Behavioral task
behavioral1
Sample
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe
Resource
win7-20220414-en
General
-
Target
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe
-
Size
1.6MB
-
MD5
e6f466381d62de836b5a8cf53cf571bb
-
SHA1
28f597812740bd57e12ec472f0f6c3ae12b46103
-
SHA256
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
-
SHA512
0d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
Malware Config
Extracted
azorult
https://www.interactiveresumebuilder.com/admin/images/icons/FTP/index.php
Extracted
nanocore
1.2.2.0
blackhill.ddns.net:54984
185.125.205.75:54984
c7192853-3ef1-495d-8d9e-aa7345c98e7f
-
activate_away_mode
true
-
backup_connection_host
185.125.205.75
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2018-07-28T15:08:16.000917836Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
54984
-
default_group
Lord
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
c7192853-3ef1-495d-8d9e-aa7345c98e7f
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
blackhill.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
pony
https://www.interactiveresumebuilder.com/admin/processImage/image/Panel/gate.php
Extracted
formbook
3.9
dt
adelparis.com
maheandco.com
workersoflight.net
lacrosseparts.com
cuzcu.info
respectchoice.net
dietdreambiz.com
lrmduxiufs.biz
kdnbooks.com
gkg8.com
niun.ltd
91socang.com
thaimedicalweed.com
memechapin.com
jennifersclark.com
americanwornjeans.com
cheok.group
theloans.store
ashlyanderson.net
sportsbettingbigdata.com
news-kids.com
pedalstyle.style
files-fast-archive.date
fijo.ltd
shockproofsounds.com
alphalance.com
solotradingusa.com
unobat.com
preservetitle.com
huissier-ferrandi-costa.com
dandi-troubleshooter.com
eesdv.com
dense.ltd
cadou.gratis
roommi.com
publikuj.net
idonthavetineforthat.com
sander-gerber-pension-plan.com
shieldtheweb.com
529man.com
maijiawin.net
silvanfm.com
sandraetleyoga.com
supremeseu.store
margaretflores.info
do-it-your-life.com
compriamouffici.com
talentquarters.com
madeinpastroploin.com
patihaberleri.com
youthmomentum.net
sobalada.net
topemailmktg.com
ayjia.com
mailmefun.com
bewegungsarten.com
aifengdao.com
sellmyfacebookpage.com
sehua35.com
antidotebooking.com
oyyiqi.com
sunantajewelry.com
zhqc.info
ephclinic.com
poyik.com
Signatures
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14
suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14
-
Formbook Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4936-179-0x0000000000400000-0x000000000042A000-memory.dmp formbook behavioral2/memory/4604-237-0x0000000000400000-0x000000000042A000-memory.dmp formbook -
Executes dropped EXE 21 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exerundll.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exenetwork.exe.exerundll.exenetwork.exe.exenetwork.exe.exenetwork.exe.exenetwork.exemgr.exenetwork.exe.exenetwork.exe.exenetwork.exe.exenetwork.exe.exepid process 4324 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 1876 rundll.exe 2124 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 2104 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 4620 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe 3476 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 4968 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 2680 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 4936 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe 1460 network.exe.exe 4432 network.exe.exe 1432 rundll.exe 380 network.exe.exe 1580 network.exe.exe 3688 network.exe.exe 3828 network.exemgr.exe 2776 network.exe.exe 4552 network.exe.exe 2104 network.exe.exe 4604 network.exe.exe -
Processes:
resource yara_rule behavioral2/memory/4620-160-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4088-173-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4088-176-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4088-177-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4088-183-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4088-189-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4552-225-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4552-226-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4552-227-0x0000000000400000-0x000000000041D000-memory.dmp upx behavioral2/memory/4552-229-0x0000000000400000-0x000000000041D000-memory.dmp upx -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
network.exe.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation network.exe.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation network.exe.exe -
Loads dropped DLL 1 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exepid process 4620 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook accounts 1 TTPs 2 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts network.exe.exe -
Accesses Microsoft Outlook profiles 1 TTPs 2 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook network.exe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe -
Suspicious use of SetThreadContext 11 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exenetwork.exe.exedescription pid process target process PID 796 set thread context of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 set thread context of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 set thread context of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 set thread context of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 set thread context of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 1460 set thread context of 4432 1460 network.exe.exe network.exe.exe PID 1460 set thread context of 1580 1460 network.exe.exe network.exe.exe PID 1460 set thread context of 2776 1460 network.exe.exe network.exe.exe PID 1460 set thread context of 4552 1460 network.exe.exe network.exe.exe PID 1460 set thread context of 4604 1460 network.exe.exe network.exe.exe PID 4604 set thread context of 3168 4604 network.exe.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1624 4620 WerFault.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe 4996 3828 WerFault.exe network.exemgr.exe -
NTFS ADS 4 IoCs
Processes:
cmd.execmd.execmd.execmd.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\network.exe.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe:Zone.Identifier cmd.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe:Zone.Identifier cmd.exe File created C:\Users\Admin\AppData\Local\Temp\network.exe.exe:Zone.Identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll.exepid process 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe 1876 rundll.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exepid process 3476 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
network.exe.exepid process 4604 network.exe.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exepid process 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exerundll.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exenetwork.exe.exerundll.exenetwork.exe.exedescription pid process Token: SeDebugPrivilege 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeDebugPrivilege 1876 rundll.exe Token: SeDebugPrivilege 3476 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeImpersonatePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeTcbPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeChangeNotifyPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeCreateTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeBackupPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeRestorePrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeIncreaseQuotaPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeAssignPrimaryTokenPrivilege 4088 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe Token: SeDebugPrivilege 1460 network.exe.exe Token: SeDebugPrivilege 1432 rundll.exe Token: SeImpersonatePrivilege 4552 network.exe.exe Token: SeTcbPrivilege 4552 network.exe.exe Token: SeChangeNotifyPrivilege 4552 network.exe.exe Token: SeCreateTokenPrivilege 4552 network.exe.exe Token: SeBackupPrivilege 4552 network.exe.exe Token: SeRestorePrivilege 4552 network.exe.exe Token: SeIncreaseQuotaPrivilege 4552 network.exe.exe Token: SeAssignPrimaryTokenPrivilege 4552 network.exe.exe Token: SeImpersonatePrivilege 4552 network.exe.exe Token: SeTcbPrivilege 4552 network.exe.exe Token: SeChangeNotifyPrivilege 4552 network.exe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeb67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exedescription pid process target process PID 796 wrote to memory of 3104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 3104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 3104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 4552 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 4552 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 4552 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4324 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 4324 wrote to memory of 1876 4324 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe rundll.exe PID 4324 wrote to memory of 1876 4324 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe rundll.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2124 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2104 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 2124 wrote to memory of 4620 2124 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe PID 2124 wrote to memory of 4620 2124 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe PID 2124 wrote to memory of 4620 2124 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 3476 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4968 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4968 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4968 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2680 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2680 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 2680 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4088 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 4936 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe PID 796 wrote to memory of 260 796 b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe cmd.exe -
outlook_win_path 1 IoCs
Processes:
network.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook network.exe.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe:Zone.Identifier"3⤵
- NTFS ADS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe:Zone.Identifier"3⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rundll.exeC:\Users\Admin\AppData\Local\Temp\rundll.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exeC:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 5565⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240664625.bat" "C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe" "4⤵
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exe"3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c, "C:\Users\Admin\AppData\Local\Temp\network.exe.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\network.exe.exe:Zone.Identifier"5⤵
- NTFS ADS
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\network.exe.exe:Zone.Identifier"5⤵
- NTFS ADS
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\rundll.exeC:\Users\Admin\AppData\Local\Temp\rundll.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\network.exemgr.exeC:\Users\Admin\AppData\Local\Temp\network.exemgr.exe6⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 5407⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
- Checks computer location settings
- Accesses Microsoft Outlook accounts
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_win_path
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240700843.bat" "C:\Users\Admin\AppData\Local\Temp\network.exe.exe" "6⤵
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exe"C:\Users\Admin\AppData\Local\Temp\network.exe.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4620 -ip 46201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3828 -ip 38281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751Filesize
717B
MD5ec8ff3b1ded0246437b1472c69dd1811
SHA1d813e874c2524e3a7da6c466c67854ad16800326
SHA256e634c2d1ed20e0638c95597adf4c9d392ebab932d3353f18af1e4421f4bb9cab
SHA512e967b804cbf2d6da30a532cbc62557d09bd236807790040c6bee5584a482dc09d724fc1d9ac0de6aa5b4e8b1fff72c8ab3206222cc2c95a91035754ac1257552
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8C3470A6B71CECBC61EC30B5B391270EFilesize
503B
MD538d5516d971f880adcbb45790fb9df44
SHA1dcf20d8d390b0756b3b79a4f1560e9882fa54313
SHA2566c5d2fba25880622542ad7584555078fbbc1c97aa62b6de5039dfe4b87317e43
SHA512131839f71f99d803fa6bc0ce8a80eda89e277b26a5c78c4dbf2947d5a8ed6d035a2638d1f3f4baf9c6c2ed3fd0a1b21243252990be366e70556871923ebd829e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751Filesize
192B
MD56678ac7acf31771e9e8ae10891653e6b
SHA171a30b8cbc09ad850ca955ad4cd5887c9514e65c
SHA256a251f7dcb8ed0b5329fa08c87d853be27bd777ca64680098fdd40f41ba3d40c4
SHA51297f68e20c62153575e89655273fa1bc921563b9ea89d5f35f33c7acbd34e1390cab8583fda300543bb113d171a982a8715da17451fb9a90509bcc0e8aea78b4e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8C3470A6B71CECBC61EC30B5B391270EFilesize
548B
MD5c6c1242d4ac8b5ed48fb25bbab08bb5b
SHA18686411cd28db011d1951b88e030e3229e0d1634
SHA25610bd9bc70874acc34214dd0c724f199ac7cc4a2a6d02801e02aebd77b7889365
SHA5122d26c95255e949111c56aa82a9805d69f20ca8f5cdf2ee3b1724b84195168b9d1b3a092991f4ac09ba364b6e72d82edad9679e90e1abc3d72eefb2f196225859
-
C:\Users\Admin\AppData\Local\Temp\240664625.batFilesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
C:\Users\Admin\AppData\Local\Temp\240700843.batFilesize
94B
MD53880eeb1c736d853eb13b44898b718ab
SHA14eec9d50360cd815211e3c4e6bdd08271b6ec8e6
SHA256936d9411d5226b7c5a150ecaf422987590a8870c8e095e1caa072273041a86e7
SHA5123eaa3dddd7a11942e75acd44208fbe3d3ff8f4006951cd970fb9ab748c160739409803450d28037e577443504707fc310c634e9dc54d0c25e8cfe6094f017c6b
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exeFilesize
106KB
MD5fe36fb1073e6f8fa14d7250501a29aaf
SHA16c7e01278362797dabcff3e666b68227cb9af10f
SHA256f34e5af97ccb3574f7d5343246138daf979bfd1f9c37590e9a41f6420ddb3bb6
SHA5128584c008c5780352f634c37b7f46543a26280b57577b675f6e72185bfc1d95f771d210d799d704eceaba509ebfd2796fb43829495d5b2a568c741ad2d44f882f
-
C:\Users\Admin\AppData\Local\Temp\b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033mgr.exeFilesize
106KB
MD5fe36fb1073e6f8fa14d7250501a29aaf
SHA16c7e01278362797dabcff3e666b68227cb9af10f
SHA256f34e5af97ccb3574f7d5343246138daf979bfd1f9c37590e9a41f6420ddb3bb6
SHA5128584c008c5780352f634c37b7f46543a26280b57577b675f6e72185bfc1d95f771d210d799d704eceaba509ebfd2796fb43829495d5b2a568c741ad2d44f882f
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exe.exeFilesize
1.6MB
MD5e6f466381d62de836b5a8cf53cf571bb
SHA128f597812740bd57e12ec472f0f6c3ae12b46103
SHA256b67bebd37c39f6f5cc7236ac443f9f095fed4764758735c77317c8896b516033
SHA5120d507cfecc591935b548c1ffc04750f65c1dc8669ec7e0190c0b580a35ecfb9be7ab150f5353dcf1fe8267bce2a16610c70165aadd32895788c8c7ded953562c
-
C:\Users\Admin\AppData\Local\Temp\network.exemgr.exeFilesize
106KB
MD5fe36fb1073e6f8fa14d7250501a29aaf
SHA16c7e01278362797dabcff3e666b68227cb9af10f
SHA256f34e5af97ccb3574f7d5343246138daf979bfd1f9c37590e9a41f6420ddb3bb6
SHA5128584c008c5780352f634c37b7f46543a26280b57577b675f6e72185bfc1d95f771d210d799d704eceaba509ebfd2796fb43829495d5b2a568c741ad2d44f882f
-
C:\Users\Admin\AppData\Local\Temp\rundll.exeFilesize
8KB
MD53b43488997e498313ddf322481621b2b
SHA1ca9329e3129fe83fe0b084b91a6016a16edcb9c0
SHA2563a5bf0b0c1650b75a6cc29186456666bee4be6cb0573377bb8e1af777eed169c
SHA5124931eb21aa376d6b0728f75ee97020d0ec14d1aec5773e29fa61a7a087ecc1e960837a39a5563d789e680d0c94389f383d35d7c074df133c2aa964c0d514f8ec
-
C:\Users\Admin\AppData\Local\Temp\rundll.exeFilesize
8KB
MD53b43488997e498313ddf322481621b2b
SHA1ca9329e3129fe83fe0b084b91a6016a16edcb9c0
SHA2563a5bf0b0c1650b75a6cc29186456666bee4be6cb0573377bb8e1af777eed169c
SHA5124931eb21aa376d6b0728f75ee97020d0ec14d1aec5773e29fa61a7a087ecc1e960837a39a5563d789e680d0c94389f383d35d7c074df133c2aa964c0d514f8ec
-
C:\Users\Admin\AppData\Local\Temp\rundll.exeFilesize
8KB
MD53b43488997e498313ddf322481621b2b
SHA1ca9329e3129fe83fe0b084b91a6016a16edcb9c0
SHA2563a5bf0b0c1650b75a6cc29186456666bee4be6cb0573377bb8e1af777eed169c
SHA5124931eb21aa376d6b0728f75ee97020d0ec14d1aec5773e29fa61a7a087ecc1e960837a39a5563d789e680d0c94389f383d35d7c074df133c2aa964c0d514f8ec
-
C:\Users\Admin\AppData\Local\Temp\~TM5DFE.tmpFilesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
memory/260-181-0x0000000000000000-mapping.dmp
-
memory/380-200-0x0000000000000000-mapping.dmp
-
memory/796-137-0x0000000005F10000-0x0000000005FA2000-memory.dmpFilesize
584KB
-
memory/796-135-0x0000000006750000-0x0000000006CF4000-memory.dmpFilesize
5.6MB
-
memory/796-130-0x0000000000840000-0x00000000009D6000-memory.dmpFilesize
1.6MB
-
memory/796-131-0x0000000005360000-0x0000000005382000-memory.dmpFilesize
136KB
-
memory/796-132-0x0000000005420000-0x0000000005486000-memory.dmpFilesize
408KB
-
memory/796-138-0x0000000007C00000-0x0000000007C9C000-memory.dmpFilesize
624KB
-
memory/796-134-0x0000000005FD0000-0x0000000006192000-memory.dmpFilesize
1.8MB
-
memory/1432-197-0x0000000000000000-mapping.dmp
-
memory/1460-184-0x0000000000000000-mapping.dmp
-
memory/1580-218-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1580-207-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/1580-202-0x0000000000000000-mapping.dmp
-
memory/1876-144-0x0000000000000000-mapping.dmp
-
memory/2104-154-0x0000000000000000-mapping.dmp
-
memory/2104-231-0x0000000000000000-mapping.dmp
-
memory/2124-148-0x0000000000000000-mapping.dmp
-
memory/2124-149-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2124-152-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2124-153-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2124-166-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2124-186-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2168-190-0x0000000000000000-mapping.dmp
-
memory/2680-169-0x0000000000000000-mapping.dmp
-
memory/2776-217-0x0000000000000000-mapping.dmp
-
memory/3104-133-0x0000000000000000-mapping.dmp
-
memory/3168-240-0x0000000008DD0000-0x0000000008F65000-memory.dmpFilesize
1.6MB
-
memory/3476-163-0x0000000000000000-mapping.dmp
-
memory/3476-164-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/3476-172-0x0000000005510000-0x000000000551A000-memory.dmpFilesize
40KB
-
memory/3688-209-0x0000000000000000-mapping.dmp
-
memory/3828-211-0x0000000000000000-mapping.dmp
-
memory/4088-189-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4088-171-0x0000000000000000-mapping.dmp
-
memory/4088-173-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4088-176-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4088-183-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4088-177-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4324-147-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4324-143-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4324-142-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4324-140-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4324-139-0x0000000000000000-mapping.dmp
-
memory/4432-192-0x0000000000000000-mapping.dmp
-
memory/4432-199-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4432-208-0x0000000000400000-0x000000000041B000-memory.dmpFilesize
108KB
-
memory/4552-225-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4552-229-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4552-221-0x0000000000000000-mapping.dmp
-
memory/4552-136-0x0000000000000000-mapping.dmp
-
memory/4552-226-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4552-227-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/4604-233-0x0000000000000000-mapping.dmp
-
memory/4604-237-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4604-238-0x0000000001630000-0x000000000197A000-memory.dmpFilesize
3.3MB
-
memory/4604-239-0x0000000001040000-0x0000000001054000-memory.dmpFilesize
80KB
-
memory/4612-187-0x0000000000000000-mapping.dmp
-
memory/4620-161-0x0000000000580000-0x00000000005AA000-memory.dmpFilesize
168KB
-
memory/4620-162-0x0000000077780000-0x0000000077923000-memory.dmpFilesize
1.6MB
-
memory/4620-156-0x0000000000000000-mapping.dmp
-
memory/4620-160-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4888-191-0x0000000000000000-mapping.dmp
-
memory/4936-179-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4936-178-0x0000000000000000-mapping.dmp
-
memory/4936-182-0x0000000001640000-0x000000000198A000-memory.dmpFilesize
3.3MB
-
memory/4968-167-0x0000000000000000-mapping.dmp
-
memory/5036-228-0x0000000000000000-mapping.dmp