Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
30-07-2022 20:48
Behavioral task
behavioral1
Sample
0x00080000000122f6-157.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
0x00080000000122f6-157.exe
Resource
win10v2004-20220721-en
General
-
Target
0x00080000000122f6-157.exe
-
Size
1.1MB
-
MD5
9db9ef06359cce014baef96fa69b5a7c
-
SHA1
614c739b69be9a3914a9ca9548245ed2c97ceb63
-
SHA256
50df788859ce3024e9018f60f7c04aa43c191de7b1578fdbebc7478898d5cd8d
-
SHA512
9d80f7b815d56a10179c164580672a2947e130321c21037747d10859e5540fa55daa1b495e48e6b41c7df51ef9567743912a2d4b1ffa9a843f3fc34d2803e583
Malware Config
Extracted
redline
mixbasic
185.215.113.70:21508
-
auth_value
51198335c60aa738686c8ae42e2c8466
Extracted
raccoon
afb5c633c4650f69312baef49db9dfa4
http://77.73.132.84
Extracted
nymaim
208.67.104.9
212.192.241.16
Extracted
djvu
http://acacaca.org/test3/get.php
-
extension
.vvwq
-
offline_id
rE5LpDv2ftYRXAo7bC18EpzfRMTHSGjgfyIMfZt1
-
payload_url
http://rgyui.top/dl/build2.exe
http://acacaca.org/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-QsoSRIeAK6 Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0532Jhyjd
Signatures
-
Detected Djvu ransomware 6 IoCs
Processes:
resource yara_rule behavioral2/memory/4560-226-0x0000000002230000-0x000000000234B000-memory.dmp family_djvu behavioral2/memory/76520-229-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/76520-231-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/76520-227-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/76520-233-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral2/memory/76520-251-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
Processes:
0x00080000000122f6-157.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRawWriteNotification = "1" 0x00080000000122f6-157.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0x00080000000122f6-157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0x00080000000122f6-157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0x00080000000122f6-157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0x00080000000122f6-157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0x00080000000122f6-157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0x00080000000122f6-157.exe -
Raccoon Stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/1160-187-0x0000000002070000-0x0000000002086000-memory.dmp family_raccoon behavioral2/memory/1160-188-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon behavioral2/memory/1160-213-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon behavioral2/memory/1160-244-0x0000000000400000-0x00000000004B5000-memory.dmp family_raccoon -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exe family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exe family_redline behavioral2/memory/396-167-0x00000000009D0000-0x0000000000A14000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 11 IoCs
Processes:
TPI3_5ariMKDwp3RRorQfeY6.exeuglrqGAsyI63wivd7zcnGHlz.exeG80AcFC_2OvNfQoEeQFzIoGj.exef6NZ8kidNXJw8zvpSb0EO8Iy.exeWhFmzVzYkAfOwQQ1s40JsZWI.exedEcvoZxHdgFgL8tpxYjO3CNQ.exeLMdP5pcKQpIye3wUahnIlKwX.exehtG4qBVAwlXpZIozgMG6whg4.exess0F2azzVaPCTOeWzkRpzdVQ.exepAZO2CySsAwXiI2qvXdzzbPY.exeASiDBczXIz8dZQmknuzaJnF1.exepid process 2168 TPI3_5ariMKDwp3RRorQfeY6.exe 1248 uglrqGAsyI63wivd7zcnGHlz.exe 1160 G80AcFC_2OvNfQoEeQFzIoGj.exe 4560 f6NZ8kidNXJw8zvpSb0EO8Iy.exe 2312 WhFmzVzYkAfOwQQ1s40JsZWI.exe 3152 dEcvoZxHdgFgL8tpxYjO3CNQ.exe 3120 LMdP5pcKQpIye3wUahnIlKwX.exe 4256 htG4qBVAwlXpZIozgMG6whg4.exe 908 ss0F2azzVaPCTOeWzkRpzdVQ.exe 2904 pAZO2CySsAwXiI2qvXdzzbPY.exe 5032 ASiDBczXIz8dZQmknuzaJnF1.exe -
Processes:
resource yara_rule C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exe upx C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exe upx behavioral2/memory/2904-169-0x0000000000400000-0x0000000000C96000-memory.dmp upx behavioral2/memory/2904-196-0x0000000000400000-0x0000000000C96000-memory.dmp upx behavioral2/memory/7012-205-0x0000000010000000-0x00000000100B5000-memory.dmp upx behavioral2/memory/7012-209-0x0000000010000000-0x00000000100B5000-memory.dmp upx behavioral2/memory/7012-211-0x0000000010000000-0x00000000100B5000-memory.dmp upx behavioral2/memory/7012-214-0x0000000010000000-0x00000000100B5000-memory.dmp upx behavioral2/memory/7012-237-0x0000000010000000-0x00000000100B5000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0x00080000000122f6-157.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Control Panel\International\Geo\Nation 0x00080000000122f6-157.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 8 ipinfo.io 159 api.2ip.ua 160 api.2ip.ua 7 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 76544 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 4180 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 76548 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 91888 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 113984 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 114048 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 130968 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe 174544 2168 WerFault.exe TPI3_5ariMKDwp3RRorQfeY6.exe 185164 1248 WerFault.exe uglrqGAsyI63wivd7zcnGHlz.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0x00080000000122f6-157.exepid process 4860 0x00080000000122f6-157.exe 4860 0x00080000000122f6-157.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
0x00080000000122f6-157.exedescription pid process target process PID 4860 wrote to memory of 2168 4860 0x00080000000122f6-157.exe TPI3_5ariMKDwp3RRorQfeY6.exe PID 4860 wrote to memory of 2168 4860 0x00080000000122f6-157.exe TPI3_5ariMKDwp3RRorQfeY6.exe PID 4860 wrote to memory of 2168 4860 0x00080000000122f6-157.exe TPI3_5ariMKDwp3RRorQfeY6.exe PID 4860 wrote to memory of 1248 4860 0x00080000000122f6-157.exe uglrqGAsyI63wivd7zcnGHlz.exe PID 4860 wrote to memory of 1248 4860 0x00080000000122f6-157.exe uglrqGAsyI63wivd7zcnGHlz.exe PID 4860 wrote to memory of 1248 4860 0x00080000000122f6-157.exe uglrqGAsyI63wivd7zcnGHlz.exe PID 4860 wrote to memory of 1160 4860 0x00080000000122f6-157.exe G80AcFC_2OvNfQoEeQFzIoGj.exe PID 4860 wrote to memory of 1160 4860 0x00080000000122f6-157.exe G80AcFC_2OvNfQoEeQFzIoGj.exe PID 4860 wrote to memory of 1160 4860 0x00080000000122f6-157.exe G80AcFC_2OvNfQoEeQFzIoGj.exe PID 4860 wrote to memory of 4560 4860 0x00080000000122f6-157.exe f6NZ8kidNXJw8zvpSb0EO8Iy.exe PID 4860 wrote to memory of 4560 4860 0x00080000000122f6-157.exe f6NZ8kidNXJw8zvpSb0EO8Iy.exe PID 4860 wrote to memory of 4560 4860 0x00080000000122f6-157.exe f6NZ8kidNXJw8zvpSb0EO8Iy.exe PID 4860 wrote to memory of 2312 4860 0x00080000000122f6-157.exe WhFmzVzYkAfOwQQ1s40JsZWI.exe PID 4860 wrote to memory of 2312 4860 0x00080000000122f6-157.exe WhFmzVzYkAfOwQQ1s40JsZWI.exe PID 4860 wrote to memory of 3152 4860 0x00080000000122f6-157.exe dEcvoZxHdgFgL8tpxYjO3CNQ.exe PID 4860 wrote to memory of 3152 4860 0x00080000000122f6-157.exe dEcvoZxHdgFgL8tpxYjO3CNQ.exe PID 4860 wrote to memory of 3152 4860 0x00080000000122f6-157.exe dEcvoZxHdgFgL8tpxYjO3CNQ.exe PID 4860 wrote to memory of 3120 4860 0x00080000000122f6-157.exe LMdP5pcKQpIye3wUahnIlKwX.exe PID 4860 wrote to memory of 3120 4860 0x00080000000122f6-157.exe LMdP5pcKQpIye3wUahnIlKwX.exe PID 4860 wrote to memory of 4256 4860 0x00080000000122f6-157.exe htG4qBVAwlXpZIozgMG6whg4.exe PID 4860 wrote to memory of 4256 4860 0x00080000000122f6-157.exe htG4qBVAwlXpZIozgMG6whg4.exe PID 4860 wrote to memory of 4256 4860 0x00080000000122f6-157.exe htG4qBVAwlXpZIozgMG6whg4.exe PID 4860 wrote to memory of 908 4860 0x00080000000122f6-157.exe ss0F2azzVaPCTOeWzkRpzdVQ.exe PID 4860 wrote to memory of 908 4860 0x00080000000122f6-157.exe ss0F2azzVaPCTOeWzkRpzdVQ.exe PID 4860 wrote to memory of 908 4860 0x00080000000122f6-157.exe ss0F2azzVaPCTOeWzkRpzdVQ.exe PID 4860 wrote to memory of 5032 4860 0x00080000000122f6-157.exe ASiDBczXIz8dZQmknuzaJnF1.exe PID 4860 wrote to memory of 5032 4860 0x00080000000122f6-157.exe ASiDBczXIz8dZQmknuzaJnF1.exe PID 4860 wrote to memory of 5032 4860 0x00080000000122f6-157.exe ASiDBczXIz8dZQmknuzaJnF1.exe PID 4860 wrote to memory of 2904 4860 0x00080000000122f6-157.exe pAZO2CySsAwXiI2qvXdzzbPY.exe PID 4860 wrote to memory of 2904 4860 0x00080000000122f6-157.exe pAZO2CySsAwXiI2qvXdzzbPY.exe PID 4860 wrote to memory of 2904 4860 0x00080000000122f6-157.exe pAZO2CySsAwXiI2qvXdzzbPY.exe PID 4860 wrote to memory of 3124 4860 0x00080000000122f6-157.exe WS46W8MdZ55j5PO5Ed9StNZz.exe PID 4860 wrote to memory of 3124 4860 0x00080000000122f6-157.exe WS46W8MdZ55j5PO5Ed9StNZz.exe PID 4860 wrote to memory of 3124 4860 0x00080000000122f6-157.exe WS46W8MdZ55j5PO5Ed9StNZz.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x00080000000122f6-157.exe"C:\Users\Admin\AppData\Local\Temp\0x00080000000122f6-157.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\TPI3_5ariMKDwp3RRorQfeY6.exe"C:\Users\Admin\Documents\TPI3_5ariMKDwp3RRorQfeY6.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12203⤵
- Program crash
-
C:\Users\Admin\Documents\dEcvoZxHdgFgL8tpxYjO3CNQ.exe"C:\Users\Admin\Documents\dEcvoZxHdgFgL8tpxYjO3CNQ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\LMdP5pcKQpIye3wUahnIlKwX.exe"C:\Users\Admin\Documents\LMdP5pcKQpIye3wUahnIlKwX.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXE3⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA2AA==4⤵
-
C:\Users\Admin\Documents\WhFmzVzYkAfOwQQ1s40JsZWI.exe"C:\Users\Admin\Documents\WhFmzVzYkAfOwQQ1s40JsZWI.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exe3⤵
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe"C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe"C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe"3⤵
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\d8ef9449-0bfe-4796-b3fc-342baaefe216" /deny *S-1-1-0:(OI)(CI)(DE,DC)4⤵
- Modifies file permissions
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe"C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exe" --Admin IsNotAutoStart IsNotTask4⤵
-
C:\Users\Admin\Documents\G80AcFC_2OvNfQoEeQFzIoGj.exe"C:\Users\Admin\Documents\G80AcFC_2OvNfQoEeQFzIoGj.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\uglrqGAsyI63wivd7zcnGHlz.exe"C:\Users\Admin\Documents\uglrqGAsyI63wivd7zcnGHlz.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 4563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 7643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 7723⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8163⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 8363⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 10123⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 13563⤵
- Program crash
-
C:\Users\Admin\Documents\WS46W8MdZ55j5PO5Ed9StNZz.exe"C:\Users\Admin\Documents\WS46W8MdZ55j5PO5Ed9StNZz.exe"2⤵
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\Nc7fQU2R.Cpl",3⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Nc7fQU2R.Cpl",4⤵
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\Nc7fQU2R.Cpl",5⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\Nc7fQU2R.Cpl",6⤵
-
C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exe"C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\ASiDBczXIz8dZQmknuzaJnF1.exe"C:\Users\Admin\Documents\ASiDBczXIz8dZQmknuzaJnF1.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\ss0F2azzVaPCTOeWzkRpzdVQ.exe"C:\Users\Admin\Documents\ss0F2azzVaPCTOeWzkRpzdVQ.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\htG4qBVAwlXpZIozgMG6whg4.exe"C:\Users\Admin\Documents\htG4qBVAwlXpZIozgMG6whg4.exe"2⤵
- Executes dropped EXE
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
-
C:\Users\Admin\Documents\RKVQxpHa64Oy32M9HP0N7wtZ.exe"C:\Users\Admin\Documents\RKVQxpHa64Oy32M9HP0N7wtZ.exe"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 3 & del "C:\Users\Admin\Documents\RKVQxpHa64Oy32M9HP0N7wtZ.exe"3⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 34⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1248 -ip 12481⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2168 -ip 21681⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1248 -ip 12481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\mozglue.dllFilesize
612KB
MD5f07d9977430e762b563eaadc2b94bbfa
SHA1da0a05b2b8d269fb73558dfcf0ed5c167f6d3877
SHA2564191faf7e5eb105a0f4c5c6ed3e9e9c71014e8aa39bbee313bc92d1411e9e862
SHA5126afd512e4099643bba3fc7700dd72744156b78b7bda10263ba1f8571d1e282133a433215a9222a7799f9824f244a2bc80c2816a62de1497017a4b26d562b7eaf
-
C:\Users\Admin\AppData\LocalLow\nss3.dllFilesize
1.9MB
MD5f67d08e8c02574cbc2f1122c53bfb976
SHA16522992957e7e4d074947cad63189f308a80fcf2
SHA256c65b7afb05ee2b2687e6280594019068c3d3829182dfe8604ce4adf2116cc46e
SHA5122e9d0a211d2b085514f181852fae6e7ca6aed4d29f396348bedb59c556e39621810a9a74671566a49e126ec73a60d0f781fa9085eb407df1eefd942c18853be5
-
C:\Users\Admin\AppData\LocalLow\sqlite3.dllFilesize
1.0MB
MD5dbf4f8dcefb8056dc6bae4b67ff810ce
SHA1bbac1dd8a07c6069415c04b62747d794736d0689
SHA25647b64311719000fa8c432165a0fdcdfed735d5b54977b052de915b1cbbbf9d68
SHA512b572ca2f2e4a5cc93e4fcc7a18c0ae6df888aa4c55bc7da591e316927a4b5cfcbdda6e60018950be891ff3b26f470cc5cce34d217c2d35074322ab84c32a25d1
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exeFilesize
298KB
MD597af5fafc1b1f39ddd066b0e0822a574
SHA1a81e3a2c887845ec0dfb03c8607cbfb5e9d1d3ae
SHA256df385653d976d5814751a701f40672ef0f7039059107b50865bb7f8beedd4c02
SHA5122503f0056368b5df4ed9e71912f38ab5cea99851adbae431368d029757d3866585033a5ad4d7e920b3f29f54420de47775ee6819d6a5f533ee309bba002ad3e9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\File.exeFilesize
298KB
MD597af5fafc1b1f39ddd066b0e0822a574
SHA1a81e3a2c887845ec0dfb03c8607cbfb5e9d1d3ae
SHA256df385653d976d5814751a701f40672ef0f7039059107b50865bb7f8beedd4c02
SHA5122503f0056368b5df4ed9e71912f38ab5cea99851adbae431368d029757d3866585033a5ad4d7e920b3f29f54420de47775ee6819d6a5f533ee309bba002ad3e9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXEFilesize
9.6MB
MD507ee3b5c4c8399e000b8cb9ba2782d38
SHA1a532b34f0179d7945bc7c72c9633743bcd887a42
SHA2563c52f209edc146ba031e87e1e838b8b7468383773a0685d497051f27d1aa68ba
SHA5122384c132f60e32023ba4bb6846d59353023d619928c9200a3b38929fc510d548f768c120e236048ae615259ebfa7ba7c3b192b1f5f708e0336cd151f3c6c01d8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~2.EXEFilesize
9.6MB
MD507ee3b5c4c8399e000b8cb9ba2782d38
SHA1a532b34f0179d7945bc7c72c9633743bcd887a42
SHA2563c52f209edc146ba031e87e1e838b8b7468383773a0685d497051f27d1aa68ba
SHA5122384c132f60e32023ba4bb6846d59353023d619928c9200a3b38929fc510d548f768c120e236048ae615259ebfa7ba7c3b192b1f5f708e0336cd151f3c6c01d8
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SETUP_~4.EXEFilesize
5.6MB
MD51cafa344aecb7d7e47f61bf95accfae3
SHA12d804dd352172a7549e311a56142fcbe5e0ba932
SHA2562e88f85d0d0d0d1ccf6d0db087e2427ad19f5ea7bdb3028520c8c540ca083fa0
SHA5127da59f03ef84529d3db2e0a4d93b4e418fce4f38e19f55c82254d817ce3672306e4623cbcd1d61fcd7ba63a6e32f55de363f9ecd18c39064dfb70d70f36594fa
-
C:\Users\Admin\AppData\Local\Temp\Nc7fQU2R.CplFilesize
30.1MB
MD5f49541cc187543da4df5742300d2ac01
SHA1cc93a121c3fe91097ca1b5efa3f4e3e666e6a269
SHA256c2ad50f365226fce882928c46d98968a06368f6992e665a43b129bdccc6c7fb8
SHA5125d76e644f13d92ca0d488ba6a46dd17189dffea8661623fecb224f3b66a29941369c744652dec1dc6d341edfd1f0dbbc8a3837e7c1b5d447de1a04fb8c2f7402
-
C:\Users\Admin\AppData\Local\Temp\Nc7fQu2r.cplFilesize
27.2MB
MD5fe0e42a095d35e2710cf1ab0aadea3c7
SHA19a5d74d2e29f908aca7964c736020bd6bdd12273
SHA256e8c8679056b22c5957d5fbc4a587397afc75be522e77ebcdffcd166734b7c711
SHA5127a35934204a727d123eade768cad1b5983ad1485774e617c57e8b6ed9fe435a562234f8e032b6b0f52804ebe3f7e84afaf7b6b1b0f0e6e37e939793a7d742491
-
C:\Users\Admin\AppData\Local\Temp\Nc7fQu2r.cplFilesize
29.9MB
MD57bf36d060de36c2ce3988d37f7b6722d
SHA10a426b6956016b92191f0bdcef028aff12d22632
SHA2569a693983e81d02e7ca48280d6a468910b333d2f35cb7c60bfa97f58ef665dcff
SHA5129f2a1db3e9e8156e22bde14457a875b1c31ad5e4a5c6d2ea89222696b4ed680f8946ac40eddfe887bd9085e71a4200c29f9ac91b3963ad5de07de57f1e48c0e0
-
C:\Users\Admin\AppData\Local\Temp\Nc7fQu2r.cplFilesize
1.2MB
MD5f222dff6235da2a3955a39d40e35b325
SHA1df7436e6ad386d0e44eed13f06ebb55f7d8c0a14
SHA256cd18db05afcd646a6e7b3caff8585465086a0f6323a290f0c9c5df82b6eccc5f
SHA5120074eea9a6e3cf210d1983a5f9f53e86f7a1c9050cdaf8cf2a635696f758c9ec73add54b934707e6ae695f16c8e2ccb660460d85cc5b491ce2c200094f066d30
-
C:\Users\Admin\AppData\Local\Temp\Nc7fQu2r.cplFilesize
1.1MB
MD598bfff217e5b9a34b842987f1cb065c5
SHA12cb5a6fbf5a0ac1814c13a420c3f186980bd38b3
SHA256981a3476decd5e8a2869adab3d776aee45c6b6985569d6727086f684947a6b21
SHA5126382d2fb80fe1a92fd5a1ee6e62686f2afa43ae8393f9b976bc4d4903a5372a6b6cfd9363afa5d44964e87c53599dc25f5a8ff5d10e2846c98eda2606ce3100d
-
C:\Users\Admin\AppData\Local\d8ef9449-0bfe-4796-b3fc-342baaefe216\f6NZ8kidNXJw8zvpSb0EO8Iy.exeFilesize
814KB
MD5657d11ee0345b2eec0121cf0412b1ea2
SHA1c0408ed6fca4b6647daeb482054a6384e560be20
SHA256bd340f0eb1d6c09165546625f0577f9fd544f3e4cff40d4cbba011204c48a8d1
SHA5129c7ff0c67713cd46215c89a326d60ab9c8e63abfde383ecfb060baf2533f28444b399674fe85db831b660dbb507df9b3b5fbe87a3b52524dfe3359e5df42e941
-
C:\Users\Admin\Documents\ASiDBczXIz8dZQmknuzaJnF1.exeFilesize
3.5MB
MD56305d09d357cc731db6243c0799c398b
SHA11d715a7f1eda39cbb20423e8f990c6a715fbf952
SHA2565917ed8aace5f53c4b1d1cfcb5df23bb7ee68e3278a89d7a8fab165bf3283505
SHA5128a30ffc044ed5fcd86052b8dbaef1c6829577736dc0c4e0deebf5319d5d4975162c99bc7ea77edb9b0ff3499b9aeae92a95c9457c87d6fbe3b41f7cdd8924f6a
-
C:\Users\Admin\Documents\ASiDBczXIz8dZQmknuzaJnF1.exeFilesize
3.5MB
MD56305d09d357cc731db6243c0799c398b
SHA11d715a7f1eda39cbb20423e8f990c6a715fbf952
SHA2565917ed8aace5f53c4b1d1cfcb5df23bb7ee68e3278a89d7a8fab165bf3283505
SHA5128a30ffc044ed5fcd86052b8dbaef1c6829577736dc0c4e0deebf5319d5d4975162c99bc7ea77edb9b0ff3499b9aeae92a95c9457c87d6fbe3b41f7cdd8924f6a
-
C:\Users\Admin\Documents\G80AcFC_2OvNfQoEeQFzIoGj.exeFilesize
699KB
MD59fa3c4352f80b258d46e63ba44bfe66e
SHA16f4756dd0cb8bf3ac7411b1bb43699de5d5ee068
SHA25632d63d8b3d417f5578a6c72c64f9274938b2adcba211ace500db3e30ecedb5d4
SHA512620ebff6c8b58df9f3533ed9f333784f000a52d9d382a1006aac1ccb4da075d9ba10db73b8d6108493147c69ec97a5d355e653c4a71f29f5212858815ce584ce
-
C:\Users\Admin\Documents\G80AcFC_2OvNfQoEeQFzIoGj.exeFilesize
699KB
MD59fa3c4352f80b258d46e63ba44bfe66e
SHA16f4756dd0cb8bf3ac7411b1bb43699de5d5ee068
SHA25632d63d8b3d417f5578a6c72c64f9274938b2adcba211ace500db3e30ecedb5d4
SHA512620ebff6c8b58df9f3533ed9f333784f000a52d9d382a1006aac1ccb4da075d9ba10db73b8d6108493147c69ec97a5d355e653c4a71f29f5212858815ce584ce
-
C:\Users\Admin\Documents\LMdP5pcKQpIye3wUahnIlKwX.exeFilesize
155KB
MD5683dfa2dd1b2dd4293821c276d4865d7
SHA157110011341a381467c1a6369665f736643a04a3
SHA256f8ac7f0e4ec79ac6232a77613449c613549f16013e9f16066ab7ce4b03c93ea8
SHA5123d95947d15e24f41f50acf13823ae85964aa087994022edc1be455895d25dc5c3949431008d0c81792df6197048244409fc7515f69c1d316ec2e923f106fa905
-
C:\Users\Admin\Documents\RKVQxpHa64Oy32M9HP0N7wtZ.exeFilesize
1.7MB
MD5e0b2f2f4f6543a38e1dd7fc6cd534eed
SHA1b670a090e8e4e795a449b8c94bb607a86bcede32
SHA2563e2a10620b25ab253552700d49e0bac2c4a73c0907cb016894bac996b6a40fa4
SHA512a02075413f6a4886af0d829669fa2074afa2830dd0b82c2b17c2afd1b45c54a16ea98662f920716d06616648c637e35876727778f445c697b54422207713642b
-
C:\Users\Admin\Documents\RKVQxpHa64Oy32M9HP0N7wtZ.exeFilesize
1.7MB
MD5e0b2f2f4f6543a38e1dd7fc6cd534eed
SHA1b670a090e8e4e795a449b8c94bb607a86bcede32
SHA2563e2a10620b25ab253552700d49e0bac2c4a73c0907cb016894bac996b6a40fa4
SHA512a02075413f6a4886af0d829669fa2074afa2830dd0b82c2b17c2afd1b45c54a16ea98662f920716d06616648c637e35876727778f445c697b54422207713642b
-
C:\Users\Admin\Documents\TPI3_5ariMKDwp3RRorQfeY6.exeFilesize
400KB
MD5455dc9fde5ee9fb59e62ed3d818d442d
SHA1d8cec39e6a34399102711b6c53bd6bfa63a97bfc
SHA256a65b7e51bbba1ed9bda8b688063ad81127fd4ee291f4e9a53c422dfbab9753fc
SHA51205dfff0b0eacd4c07fbd3e6a4400d28bd591fa1f24a12eb9d5e04bd215f24018aaa4a67439a28e5ffa717e0c996e399f04703fd86a5367b3452e24abd334d2f4
-
C:\Users\Admin\Documents\TPI3_5ariMKDwp3RRorQfeY6.exeFilesize
400KB
MD5455dc9fde5ee9fb59e62ed3d818d442d
SHA1d8cec39e6a34399102711b6c53bd6bfa63a97bfc
SHA256a65b7e51bbba1ed9bda8b688063ad81127fd4ee291f4e9a53c422dfbab9753fc
SHA51205dfff0b0eacd4c07fbd3e6a4400d28bd591fa1f24a12eb9d5e04bd215f24018aaa4a67439a28e5ffa717e0c996e399f04703fd86a5367b3452e24abd334d2f4
-
C:\Users\Admin\Documents\WS46W8MdZ55j5PO5Ed9StNZz.exeFilesize
2.1MB
MD56872d1d9905bf0d6120e6b0cc043f374
SHA1b8fa94adc7560f21afc11749f0a912e65126a2d3
SHA256b7c6392d3bb410e3bd53f42585a210c91f06e1748308dd3bee71d20791ae9c8e
SHA512e236b1f9cb521bf649bb5522d04e1c116c38a22a14af99db3bb1d70793b5a2e64bb2656ac137a4168d4da7b3f258026cdd0acdc0b7a7bd1385d0ff8c024b9d1e
-
C:\Users\Admin\Documents\WS46W8MdZ55j5PO5Ed9StNZz.exeFilesize
2.1MB
MD56872d1d9905bf0d6120e6b0cc043f374
SHA1b8fa94adc7560f21afc11749f0a912e65126a2d3
SHA256b7c6392d3bb410e3bd53f42585a210c91f06e1748308dd3bee71d20791ae9c8e
SHA512e236b1f9cb521bf649bb5522d04e1c116c38a22a14af99db3bb1d70793b5a2e64bb2656ac137a4168d4da7b3f258026cdd0acdc0b7a7bd1385d0ff8c024b9d1e
-
C:\Users\Admin\Documents\WhFmzVzYkAfOwQQ1s40JsZWI.exeFilesize
236KB
MD5852544fd8c079f83b232df21fdeaa27e
SHA168330936d62a1aa5ac35a33f03100dc76fddfb70
SHA2564543e3dc9d8c2f570d3585e99374cb15ea0bd124dedb213fc546b9af4bf275fa
SHA5122f52d378455c488768633deb7470e24207ef991d8be97f7670c9e82069e8862a445dd92c319148ee2094f2f64736469bf9599ccffc7eb124e695d2df586c5d02
-
C:\Users\Admin\Documents\WhFmzVzYkAfOwQQ1s40JsZWI.exeFilesize
236KB
MD5852544fd8c079f83b232df21fdeaa27e
SHA168330936d62a1aa5ac35a33f03100dc76fddfb70
SHA2564543e3dc9d8c2f570d3585e99374cb15ea0bd124dedb213fc546b9af4bf275fa
SHA5122f52d378455c488768633deb7470e24207ef991d8be97f7670c9e82069e8862a445dd92c319148ee2094f2f64736469bf9599ccffc7eb124e695d2df586c5d02
-
C:\Users\Admin\Documents\dEcvoZxHdgFgL8tpxYjO3CNQ.exeFilesize
295KB
MD5bcadfe4f760729080a9717ee58fbbb72
SHA1cb2a1945d48d89786cdfc6dabec5ecdd997b1a09
SHA256f408d1cbd13af6d6e4a585ff8579229019ca1e25eef1af07facc84b5c28d9ebc
SHA5123afa6272626d461301d225687f33673cea15644de8cdd6d61bfc17a33bec93ac01186881dbb7081233efb953ef559454208ce203d698fa16810e46cd8e361dc0
-
C:\Users\Admin\Documents\dEcvoZxHdgFgL8tpxYjO3CNQ.exeFilesize
295KB
MD5bcadfe4f760729080a9717ee58fbbb72
SHA1cb2a1945d48d89786cdfc6dabec5ecdd997b1a09
SHA256f408d1cbd13af6d6e4a585ff8579229019ca1e25eef1af07facc84b5c28d9ebc
SHA5123afa6272626d461301d225687f33673cea15644de8cdd6d61bfc17a33bec93ac01186881dbb7081233efb953ef559454208ce203d698fa16810e46cd8e361dc0
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exeFilesize
814KB
MD5657d11ee0345b2eec0121cf0412b1ea2
SHA1c0408ed6fca4b6647daeb482054a6384e560be20
SHA256bd340f0eb1d6c09165546625f0577f9fd544f3e4cff40d4cbba011204c48a8d1
SHA5129c7ff0c67713cd46215c89a326d60ab9c8e63abfde383ecfb060baf2533f28444b399674fe85db831b660dbb507df9b3b5fbe87a3b52524dfe3359e5df42e941
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exeFilesize
814KB
MD5657d11ee0345b2eec0121cf0412b1ea2
SHA1c0408ed6fca4b6647daeb482054a6384e560be20
SHA256bd340f0eb1d6c09165546625f0577f9fd544f3e4cff40d4cbba011204c48a8d1
SHA5129c7ff0c67713cd46215c89a326d60ab9c8e63abfde383ecfb060baf2533f28444b399674fe85db831b660dbb507df9b3b5fbe87a3b52524dfe3359e5df42e941
-
C:\Users\Admin\Documents\f6NZ8kidNXJw8zvpSb0EO8Iy.exeFilesize
814KB
MD5657d11ee0345b2eec0121cf0412b1ea2
SHA1c0408ed6fca4b6647daeb482054a6384e560be20
SHA256bd340f0eb1d6c09165546625f0577f9fd544f3e4cff40d4cbba011204c48a8d1
SHA5129c7ff0c67713cd46215c89a326d60ab9c8e63abfde383ecfb060baf2533f28444b399674fe85db831b660dbb507df9b3b5fbe87a3b52524dfe3359e5df42e941
-
C:\Users\Admin\Documents\htG4qBVAwlXpZIozgMG6whg4.exeFilesize
2.5MB
MD5ca749fdab88482e6388cbf4504d5ad11
SHA1bdee0285a6f9794c72ac744db9eaaf994a719833
SHA256fb8b96ccfcb2103f940ebde96968ef021c61516b9fd46c4b10c1caad491314ab
SHA512664871505a34a2cb5218de7da4e8c1326c16e5045be397c04f6a7071720a72e3f08033f191b60e382517f4b843d29d0ffeb45bdfbab09aec0f2bea63d640f135
-
C:\Users\Admin\Documents\htG4qBVAwlXpZIozgMG6whg4.exeFilesize
2.5MB
MD5ca749fdab88482e6388cbf4504d5ad11
SHA1bdee0285a6f9794c72ac744db9eaaf994a719833
SHA256fb8b96ccfcb2103f940ebde96968ef021c61516b9fd46c4b10c1caad491314ab
SHA512664871505a34a2cb5218de7da4e8c1326c16e5045be397c04f6a7071720a72e3f08033f191b60e382517f4b843d29d0ffeb45bdfbab09aec0f2bea63d640f135
-
C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exeFilesize
3.5MB
MD5022300f2f31eb6576f5d92cdc49d8206
SHA1abd01d801f6463b421f038095d2f062806d509da
SHA25659fbf550f9edac6eabae2af8b50c760e9b496b96e68cb8b84d8c745d3bb9ec15
SHA5125ffddbb8a0abb08a69b659d3fb570fde79a0bc8984a835b6699cd13937447ee3aa5228c0b5aaba2ed19fa96509e25bf61830f74cdc07d515de97a7976f75ddfe
-
C:\Users\Admin\Documents\pAZO2CySsAwXiI2qvXdzzbPY.exeFilesize
3.5MB
MD5022300f2f31eb6576f5d92cdc49d8206
SHA1abd01d801f6463b421f038095d2f062806d509da
SHA25659fbf550f9edac6eabae2af8b50c760e9b496b96e68cb8b84d8c745d3bb9ec15
SHA5125ffddbb8a0abb08a69b659d3fb570fde79a0bc8984a835b6699cd13937447ee3aa5228c0b5aaba2ed19fa96509e25bf61830f74cdc07d515de97a7976f75ddfe
-
C:\Users\Admin\Documents\ss0F2azzVaPCTOeWzkRpzdVQ.exeFilesize
4.9MB
MD5abdc84a19e27cd3289a0c0549fb3d630
SHA14c2cdfc5b9d71d948c731911a178766aed309c40
SHA2561bb76c6f1ccc5832b0b80d639478cae5ee220f5f7949bb2e52de8fb20e462857
SHA512ea92462fb808e0b49976d2bd4c24b4a5b36eddb9077bd8075a63bcfef311cc39e1cd9d67b1f0606dcf138ce29e559f599d9f2a3582a4399557143bb9f9af87eb
-
C:\Users\Admin\Documents\ss0F2azzVaPCTOeWzkRpzdVQ.exeFilesize
4.9MB
MD5abdc84a19e27cd3289a0c0549fb3d630
SHA14c2cdfc5b9d71d948c731911a178766aed309c40
SHA2561bb76c6f1ccc5832b0b80d639478cae5ee220f5f7949bb2e52de8fb20e462857
SHA512ea92462fb808e0b49976d2bd4c24b4a5b36eddb9077bd8075a63bcfef311cc39e1cd9d67b1f0606dcf138ce29e559f599d9f2a3582a4399557143bb9f9af87eb
-
C:\Users\Admin\Documents\uglrqGAsyI63wivd7zcnGHlz.exeFilesize
380KB
MD563534e0cf7019e2ab24a91649281ea71
SHA1341ce2636ba70898b2c7b39ac7be5854936a876f
SHA25690960fe24e5701c447bf916c7f930ac8f60fe123bfa2023290ff2a711af4b719
SHA512bdb2b80283ea2596dfd152905c5d2d35d84a59d12a256963a64be9a17d8dd1177b129b241e2aeceb4c0b2a0600c444423aadb9a890c5bb6626a5f3963a9b0d76
-
C:\Users\Admin\Documents\uglrqGAsyI63wivd7zcnGHlz.exeFilesize
380KB
MD563534e0cf7019e2ab24a91649281ea71
SHA1341ce2636ba70898b2c7b39ac7be5854936a876f
SHA25690960fe24e5701c447bf916c7f930ac8f60fe123bfa2023290ff2a711af4b719
SHA512bdb2b80283ea2596dfd152905c5d2d35d84a59d12a256963a64be9a17d8dd1177b129b241e2aeceb4c0b2a0600c444423aadb9a890c5bb6626a5f3963a9b0d76
-
memory/396-212-0x0000000005EF0000-0x0000000005F0E000-memory.dmpFilesize
120KB
-
memory/396-163-0x0000000000000000-mapping.dmp
-
memory/396-180-0x0000000005250000-0x0000000005262000-memory.dmpFilesize
72KB
-
memory/396-182-0x0000000005380000-0x000000000548A000-memory.dmpFilesize
1.0MB
-
memory/396-203-0x0000000005DD0000-0x0000000005E62000-memory.dmpFilesize
584KB
-
memory/396-167-0x00000000009D0000-0x0000000000A14000-memory.dmpFilesize
272KB
-
memory/396-177-0x00000000057B0000-0x0000000005DC8000-memory.dmpFilesize
6.1MB
-
memory/396-185-0x00000000052B0000-0x00000000052EC000-memory.dmpFilesize
240KB
-
memory/396-204-0x0000000005720000-0x0000000005796000-memory.dmpFilesize
472KB
-
memory/908-240-0x0000000006BE0000-0x0000000006DA2000-memory.dmpFilesize
1.8MB
-
memory/908-144-0x0000000000000000-mapping.dmp
-
memory/908-260-0x0000000000400000-0x00000000008EB000-memory.dmpFilesize
4.9MB
-
memory/908-242-0x0000000006DC0000-0x00000000072EC000-memory.dmpFilesize
5.2MB
-
memory/908-168-0x0000000000400000-0x00000000008EB000-memory.dmpFilesize
4.9MB
-
memory/908-183-0x0000000005120000-0x00000000056C4000-memory.dmpFilesize
5.6MB
-
memory/908-202-0x0000000000400000-0x00000000008EB000-memory.dmpFilesize
4.9MB
-
memory/908-176-0x0000000000400000-0x00000000008EB000-memory.dmpFilesize
4.9MB
-
memory/908-194-0x00000000060A0000-0x0000000006106000-memory.dmpFilesize
408KB
-
memory/1160-132-0x0000000000000000-mapping.dmp
-
memory/1160-188-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1160-213-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1160-244-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/1160-187-0x0000000002070000-0x0000000002086000-memory.dmpFilesize
88KB
-
memory/1248-216-0x000000000077D000-0x00000000007A2000-memory.dmpFilesize
148KB
-
memory/1248-131-0x0000000000000000-mapping.dmp
-
memory/1248-224-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/1248-218-0x00000000001C0000-0x00000000001FE000-memory.dmpFilesize
248KB
-
memory/1248-249-0x000000000077D000-0x00000000007A2000-memory.dmpFilesize
148KB
-
memory/1248-250-0x0000000000400000-0x000000000046C000-memory.dmpFilesize
432KB
-
memory/2168-248-0x000000000062C000-0x0000000000656000-memory.dmpFilesize
168KB
-
memory/2168-130-0x0000000000000000-mapping.dmp
-
memory/2168-217-0x00000000001C0000-0x00000000001F8000-memory.dmpFilesize
224KB
-
memory/2168-215-0x000000000062C000-0x0000000000656000-memory.dmpFilesize
168KB
-
memory/2168-219-0x0000000000400000-0x0000000000471000-memory.dmpFilesize
452KB
-
memory/2312-134-0x0000000000000000-mapping.dmp
-
memory/2780-166-0x0000000000000000-mapping.dmp
-
memory/2780-174-0x00000000003D0000-0x00000000003EE000-memory.dmpFilesize
120KB
-
memory/2780-197-0x00000000057C0000-0x00000000057E2000-memory.dmpFilesize
136KB
-
memory/2904-196-0x0000000000400000-0x0000000000C96000-memory.dmpFilesize
8.6MB
-
memory/2904-146-0x0000000000000000-mapping.dmp
-
memory/2904-169-0x0000000000400000-0x0000000000C96000-memory.dmpFilesize
8.6MB
-
memory/3120-138-0x0000000000000000-mapping.dmp
-
memory/3124-150-0x0000000000000000-mapping.dmp
-
memory/3152-223-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/3152-235-0x0000000000400000-0x0000000000457000-memory.dmpFilesize
348KB
-
memory/3152-220-0x00000000007AC000-0x00000000007BC000-memory.dmpFilesize
64KB
-
memory/3152-135-0x0000000000000000-mapping.dmp
-
memory/3152-221-0x0000000000560000-0x0000000000569000-memory.dmpFilesize
36KB
-
memory/3344-238-0x0000000000000000-mapping.dmp
-
memory/4252-241-0x0000000000000000-mapping.dmp
-
memory/4256-143-0x0000000000000000-mapping.dmp
-
memory/4560-133-0x0000000000000000-mapping.dmp
-
memory/4560-230-0x000000000216E000-0x0000000002200000-memory.dmpFilesize
584KB
-
memory/4560-226-0x0000000002230000-0x000000000234B000-memory.dmpFilesize
1.1MB
-
memory/5032-145-0x0000000000000000-mapping.dmp
-
memory/7012-209-0x0000000010000000-0x00000000100B5000-memory.dmpFilesize
724KB
-
memory/7012-214-0x0000000010000000-0x00000000100B5000-memory.dmpFilesize
724KB
-
memory/7012-184-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/7012-237-0x0000000010000000-0x00000000100B5000-memory.dmpFilesize
724KB
-
memory/7012-205-0x0000000010000000-0x00000000100B5000-memory.dmpFilesize
724KB
-
memory/7012-211-0x0000000010000000-0x00000000100B5000-memory.dmpFilesize
724KB
-
memory/7012-178-0x0000000000000000-mapping.dmp
-
memory/20424-186-0x0000000000000000-mapping.dmp
-
memory/54924-257-0x000000002D840000-0x000000002D8E6000-memory.dmpFilesize
664KB
-
memory/54924-254-0x000000002D780000-0x000000002D83B000-memory.dmpFilesize
748KB
-
memory/54924-189-0x0000000000000000-mapping.dmp
-
memory/54924-193-0x0000000002B71000-0x0000000002B73000-memory.dmpFilesize
8KB
-
memory/54924-256-0x000000002D840000-0x000000002D8E6000-memory.dmpFilesize
664KB
-
memory/54924-198-0x00000000027D0000-0x00000000027D6000-memory.dmpFilesize
24KB
-
memory/54924-195-0x0000000002B70000-0x0000000003B70000-memory.dmpFilesize
16.0MB
-
memory/54924-243-0x0000000002B70000-0x0000000003B70000-memory.dmpFilesize
16.0MB
-
memory/68064-253-0x0000000006250000-0x000000000626A000-memory.dmpFilesize
104KB
-
memory/68064-232-0x0000000004E70000-0x0000000005498000-memory.dmpFilesize
6.2MB
-
memory/68064-207-0x0000000000000000-mapping.dmp
-
memory/68064-222-0x00000000047B0000-0x00000000047E6000-memory.dmpFilesize
216KB
-
memory/68064-252-0x00000000073B0000-0x0000000007A2A000-memory.dmpFilesize
6.5MB
-
memory/68064-234-0x00000000057B0000-0x0000000005816000-memory.dmpFilesize
408KB
-
memory/68064-239-0x0000000005900000-0x000000000591E000-memory.dmpFilesize
120KB
-
memory/76520-231-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/76520-227-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/76520-233-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/76520-229-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/76520-225-0x0000000000000000-mapping.dmp
-
memory/76520-251-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/76756-236-0x0000000000000000-mapping.dmp
-
memory/164152-261-0x0000000000000000-mapping.dmp
-
memory/171160-262-0x0000000000000000-mapping.dmp
-
memory/171160-265-0x0000000002C71000-0x0000000002C73000-memory.dmpFilesize
8KB
-
memory/171160-266-0x0000000002C70000-0x0000000003C70000-memory.dmpFilesize
16.0MB