Analysis
-
max time kernel
204s -
max time network
206s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09-10-2022 07:50
Static task
static1
URLScan task
urlscan1
General
Malware Config
Signatures
-
Async RAT payload 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1744-162-0x0000000001000000-0x00000000021D5000-memory.dmp asyncrat behavioral1/memory/1744-163-0x0000000001000000-0x00000000021D5000-memory.dmp asyncrat behavioral1/memory/1744-175-0x0000000001000000-0x00000000021D5000-memory.dmp asyncrat behavioral1/memory/1744-191-0x0000000001000000-0x00000000021D5000-memory.dmp asyncrat C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE asyncrat C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE asyncrat behavioral1/memory/4996-230-0x0000000000EE0000-0x0000000000EF2000-memory.dmp asyncrat C:\Users\Admin\AppData\Roaming\svchost.exe asyncrat C:\Users\Admin\AppData\Roaming\svchost.exe asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
SQLi Dumper_Cracked_By_Angeal.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SQLi Dumper_Cracked_By_Angeal.exe -
Executes dropped EXE 4 IoCs
Processes:
SQLi Dumper_Cracked_By_Angeal.exeSQLI DUMPER_CRACKED_BY_ANGEAL.EXESVCHOST.EXEsvchost.exepid process 1744 SQLi Dumper_Cracked_By_Angeal.exe 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4996 SVCHOST.EXE 5108 svchost.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
SQLi Dumper_Cracked_By_Angeal.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SQLi Dumper_Cracked_By_Angeal.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SQLi Dumper_Cracked_By_Angeal.exe -
Loads dropped DLL 6 IoCs
Processes:
SQLI DUMPER_CRACKED_BY_ANGEAL.EXEpid process 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE -
Processes:
resource yara_rule C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exe themida behavioral1/memory/1744-131-0x0000000001000000-0x00000000021D5000-memory.dmp themida C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exe themida behavioral1/memory/1744-161-0x0000000001000000-0x00000000021D5000-memory.dmp themida behavioral1/memory/1744-162-0x0000000001000000-0x00000000021D5000-memory.dmp themida behavioral1/memory/1744-163-0x0000000001000000-0x00000000021D5000-memory.dmp themida behavioral1/memory/1744-175-0x0000000001000000-0x00000000021D5000-memory.dmp themida behavioral1/memory/1744-191-0x0000000001000000-0x00000000021D5000-memory.dmp themida -
Processes:
SQLi Dumper_Cracked_By_Angeal.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SQLi Dumper_Cracked_By_Angeal.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 92 checkip.dyndns.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
SQLi Dumper_Cracked_By_Angeal.exepid process 1744 SQLi Dumper_Cracked_By_Angeal.exe -
Drops file in Program Files directory 3 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\SQLi Dumper v.10.2\ChilkatDotNet46.dll chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\SQLi Dumper v.10.2\SkinSoft.VisualStyler.dll chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exe chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 904 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2482096546-1136599444-1359412500-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exeSVCHOST.EXESQLI DUMPER_CRACKED_BY_ANGEAL.EXEpid process 4816 chrome.exe 4816 chrome.exe 2204 chrome.exe 2204 chrome.exe 744 chrome.exe 744 chrome.exe 4016 chrome.exe 4016 chrome.exe 5028 chrome.exe 4668 chrome.exe 4668 chrome.exe 5028 chrome.exe 1184 chrome.exe 1184 chrome.exe 96 chrome.exe 96 chrome.exe 412 chrome.exe 412 chrome.exe 2204 chrome.exe 2204 chrome.exe 756 chrome.exe 756 chrome.exe 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4996 SVCHOST.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
AUDIODG.EXE7zG.exeSVCHOST.EXESQLI DUMPER_CRACKED_BY_ANGEAL.EXEsvchost.exedescription pid process Token: 33 2276 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2276 AUDIODG.EXE Token: SeRestorePrivilege 3168 7zG.exe Token: 35 3168 7zG.exe Token: SeSecurityPrivilege 3168 7zG.exe Token: SeSecurityPrivilege 3168 7zG.exe Token: SeDebugPrivilege 4996 SVCHOST.EXE Token: SeDebugPrivilege 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE Token: SeDebugPrivilege 5108 svchost.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
Processes:
chrome.exe7zG.exeSQLI DUMPER_CRACKED_BY_ANGEAL.EXEpid process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 3168 7zG.exe 2204 chrome.exe 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe 2204 chrome.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
SQLI DUMPER_CRACKED_BY_ANGEAL.EXEpid process 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE 4844 SQLI DUMPER_CRACKED_BY_ANGEAL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2204 wrote to memory of 2352 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 2352 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 1912 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4816 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4816 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe PID 2204 wrote to memory of 4456 2204 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://mega.nz/file/DV9kgRKB#MR2VDztaRN-tiEpXXTHe4CrLJGQxUGTyKxBv6VpL2qU1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ff9dc954f50,0x7ff9dc954f60,0x7ff9dc954f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1576 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2152 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2948 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4152 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4760 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4764 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4660 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4544 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4612 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4500 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4104 /prefetch:82⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2604 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1552,8316685161994799002,7850414772927629868,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2604 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2901⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap26482:98:7zEvent69871⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exe"C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Users\Admin\AppData\Local\Temp\SQLI DUMPER_CRACKED_BY_ANGEAL.EXE"C:\Users\Admin\AppData\Local\Temp\SQLI DUMPER_CRACKED_BY_ANGEAL.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXE"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpFCAF.tmp.bat""3⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\svchost.exe.logFilesize
522B
MD529ac3d31c772ba5e216f15cd6d85cd29
SHA145d682f8f9f8658e4b1c717782811f24b08be250
SHA25682cb10a670e760c3159ae57f943dbd2b478727a9e82b307edd559e54ffad0f9d
SHA51287403b70e4ba9a19f96eaef900cffe6769c3aa35d047cac26175f27ffbed8e625a8f8a12d191a6e63f75ef4b8b1bee2078f4659325a12d534d61427d58ceb8a3
-
C:\Users\Admin\AppData\Local\Temp\ChilkatDotNet46.dllFilesize
7.3MB
MD5ac3c6280175e2fa87a761b20dd75973e
SHA1aed752549f9cc1e54ccd2cb21aabda355f2f9337
SHA256a2152f98a37ef40ba8b411b1a061dc4fc503f20313cb1c0bbd3816e14f67a03a
SHA51268ecd9221109d4e1bcc4b1d2baffff83d9fa62f5a6f9f1a58465bf534f2397c069f87f0768178c6d492a7d1a51e26d54b7497edc03882906e27577fecb7d5fd3
-
C:\Users\Admin\AppData\Local\Temp\SQLI DUMPER_CRACKED_BY_ANGEAL.EXEFilesize
3.0MB
MD59d8b946ae008bc962015cdb436a648d2
SHA1bdc46054530455e0d234f4fc23e8ff5781367b95
SHA25649606c156c838db34e09a96369d0cb9c5097e9dbc6174bd6827c09af4365edf2
SHA512c05fd8dc91edfb71665301613490f42b2095830cd11a55d5e1620e320f7ff78f906d6731206a01af1d01ed85e9292226e10548de6332d0fa739b6dcf7951b6f1
-
C:\Users\Admin\AppData\Local\Temp\SQLI DUMPER_CRACKED_BY_ANGEAL.EXEFilesize
3.0MB
MD59d8b946ae008bc962015cdb436a648d2
SHA1bdc46054530455e0d234f4fc23e8ff5781367b95
SHA25649606c156c838db34e09a96369d0cb9c5097e9dbc6174bd6827c09af4365edf2
SHA512c05fd8dc91edfb71665301613490f42b2095830cd11a55d5e1620e320f7ff78f906d6731206a01af1d01ed85e9292226e10548de6332d0fa739b6dcf7951b6f1
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXEFilesize
45KB
MD53d6f7d26fe3d241616b2c4487d41c339
SHA126d311eff092c692a4af2a16d12709cf8945fab6
SHA256fbceedf8a40ce3a3828b60cc158f755759d7905b54155de3cf2f34389b7161c1
SHA51215bb307e6c85c323da7bef23b08cbb99b1f6542f8e01322324a6360e634fcce18994de5b0c181ff96c969da00bd0c114f47c74796058c164aa501982535c1233
-
C:\Users\Admin\AppData\Local\Temp\SVCHOST.EXEFilesize
45KB
MD53d6f7d26fe3d241616b2c4487d41c339
SHA126d311eff092c692a4af2a16d12709cf8945fab6
SHA256fbceedf8a40ce3a3828b60cc158f755759d7905b54155de3cf2f34389b7161c1
SHA51215bb307e6c85c323da7bef23b08cbb99b1f6542f8e01322324a6360e634fcce18994de5b0c181ff96c969da00bd0c114f47c74796058c164aa501982535c1233
-
C:\Users\Admin\AppData\Local\Temp\SkinSoft.VisualStyler.dllFilesize
1004KB
MD5d93366374b57b5a0fe3a1a8a1ca95f78
SHA1e35d56efef3462897893f5a305f404a88ceefcc6
SHA25614f231441dad16ef046ab97415c33195056a61b0240d7d890971e5f626068925
SHA512782380533dfaf734a669e52ff7fdee64714c3ba354f24823c8b232b4af18631e237beba48e6d3ad0f5959dac5c82f93021e4923fd65be30834ffaacb14e25eb0
-
C:\Users\Admin\AppData\Local\Temp\tmpFCAF.tmp.batFilesize
151B
MD57a400e8b2f024de590b477500cc4bb49
SHA1d596bc48ab3f1ecf6c7ca46ce2f3306929c1fd8d
SHA256112331ab2ce1befd62dbd85c3e3eab141470eec1f60f2ad9acaf5994cb5d3ff6
SHA512f182f0eafe5ed3c7aaebeb08de001b7d3d1db04582e8359fa1e600c44625a0428384ac0d579c357e215247c2b00649b9d4ccd5af6208259488945ee6769cf1a2
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
45KB
MD53d6f7d26fe3d241616b2c4487d41c339
SHA126d311eff092c692a4af2a16d12709cf8945fab6
SHA256fbceedf8a40ce3a3828b60cc158f755759d7905b54155de3cf2f34389b7161c1
SHA51215bb307e6c85c323da7bef23b08cbb99b1f6542f8e01322324a6360e634fcce18994de5b0c181ff96c969da00bd0c114f47c74796058c164aa501982535c1233
-
C:\Users\Admin\AppData\Roaming\svchost.exeFilesize
45KB
MD53d6f7d26fe3d241616b2c4487d41c339
SHA126d311eff092c692a4af2a16d12709cf8945fab6
SHA256fbceedf8a40ce3a3828b60cc158f755759d7905b54155de3cf2f34389b7161c1
SHA51215bb307e6c85c323da7bef23b08cbb99b1f6542f8e01322324a6360e634fcce18994de5b0c181ff96c969da00bd0c114f47c74796058c164aa501982535c1233
-
C:\Users\Admin\Downloads\SQLi Dumper v.10.2.rarFilesize
9.8MB
MD5df2f4ca7906ceee33c28df910cc2fd47
SHA1b22d3a1d64dc49a2373288c435155237e2d53325
SHA25679650f012de2bea5b38e99a50512ac2562a640c99a29b5edc9d5c6c175a03de7
SHA5123157114c77dce58cda96e3e3dbe33ec5a108003503a3244ffbbaecd35ec6691342a11d5e41dbda5a048f18614c22e7784cc81c5699cc7a0b304ad8a443651c1c
-
C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exeFilesize
7.6MB
MD52431e2206038bb0b8a52b301b83e4143
SHA1afd1c0a4802ee4800c099b831174b3874bda5673
SHA256fe88cf44e848e80284f7e1e7eb1633fb8c7fe5cce736c35b3519ed7de4d27ab1
SHA5125b0d6c17db32db938c3fff0f1b2adb0850b682fd76a9f34987c021a53823ad90002dc3a268a39bc5e6663d307378edc4854c09229b6840cdc3bb8ec6ad19c28f
-
C:\Users\Admin\Downloads\SQLi Dumper v.10.2\SQLi Dumper_Cracked_By_Angeal.exeFilesize
7.6MB
MD52431e2206038bb0b8a52b301b83e4143
SHA1afd1c0a4802ee4800c099b831174b3874bda5673
SHA256fe88cf44e848e80284f7e1e7eb1633fb8c7fe5cce736c35b3519ed7de4d27ab1
SHA5125b0d6c17db32db938c3fff0f1b2adb0850b682fd76a9f34987c021a53823ad90002dc3a268a39bc5e6663d307378edc4854c09229b6840cdc3bb8ec6ad19c28f
-
\??\pipe\crashpad_2204_KESSSEVNFVFWNOULMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\SkinSoft\VisualStyler\2.4.0.0\x86\ssapihook.dllFilesize
57KB
MD5bb439bf268e538b714b0727f02945374
SHA153bf4afcc8ada3693d230ab4b66ce768878296e8
SHA256d1334ae830ac3ec69f2ae63c16dae778e6b6af2ff9a6226e4336451a0a1ffd5b
SHA5126167257c25e9da24dfcf223e8f4a7c438f3c02567531f5ca922e4e5330e14461d8ebe56822625b21286fa78a3b56b2940de8dfef1bee11b17e901472a7c03e34
-
\Users\Admin\AppData\Local\Temp\CHILKATDOTNET46.DLLFilesize
7.3MB
MD5ac3c6280175e2fa87a761b20dd75973e
SHA1aed752549f9cc1e54ccd2cb21aabda355f2f9337
SHA256a2152f98a37ef40ba8b411b1a061dc4fc503f20313cb1c0bbd3816e14f67a03a
SHA51268ecd9221109d4e1bcc4b1d2baffff83d9fa62f5a6f9f1a58465bf534f2397c069f87f0768178c6d492a7d1a51e26d54b7497edc03882906e27577fecb7d5fd3
-
\Users\Admin\AppData\Local\Temp\CHILKATDOTNET46.DLLFilesize
7.3MB
MD5ac3c6280175e2fa87a761b20dd75973e
SHA1aed752549f9cc1e54ccd2cb21aabda355f2f9337
SHA256a2152f98a37ef40ba8b411b1a061dc4fc503f20313cb1c0bbd3816e14f67a03a
SHA51268ecd9221109d4e1bcc4b1d2baffff83d9fa62f5a6f9f1a58465bf534f2397c069f87f0768178c6d492a7d1a51e26d54b7497edc03882906e27577fecb7d5fd3
-
\Users\Admin\AppData\Local\Temp\CHILKATDOTNET46.DLLFilesize
7.3MB
MD5ac3c6280175e2fa87a761b20dd75973e
SHA1aed752549f9cc1e54ccd2cb21aabda355f2f9337
SHA256a2152f98a37ef40ba8b411b1a061dc4fc503f20313cb1c0bbd3816e14f67a03a
SHA51268ecd9221109d4e1bcc4b1d2baffff83d9fa62f5a6f9f1a58465bf534f2397c069f87f0768178c6d492a7d1a51e26d54b7497edc03882906e27577fecb7d5fd3
-
\Users\Admin\AppData\Local\Temp\SKINSOFT.VISUALSTYLER.DLLFilesize
1004KB
MD5d93366374b57b5a0fe3a1a8a1ca95f78
SHA1e35d56efef3462897893f5a305f404a88ceefcc6
SHA25614f231441dad16ef046ab97415c33195056a61b0240d7d890971e5f626068925
SHA512782380533dfaf734a669e52ff7fdee64714c3ba354f24823c8b232b4af18631e237beba48e6d3ad0f5959dac5c82f93021e4923fd65be30834ffaacb14e25eb0
-
\Users\Admin\AppData\Local\Temp\SKINSOFT.VISUALSTYLER.DLLFilesize
1004KB
MD5d93366374b57b5a0fe3a1a8a1ca95f78
SHA1e35d56efef3462897893f5a305f404a88ceefcc6
SHA25614f231441dad16ef046ab97415c33195056a61b0240d7d890971e5f626068925
SHA512782380533dfaf734a669e52ff7fdee64714c3ba354f24823c8b232b4af18631e237beba48e6d3ad0f5959dac5c82f93021e4923fd65be30834ffaacb14e25eb0
-
memory/904-376-0x0000000000000000-mapping.dmp
-
memory/1744-171-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-137-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-144-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-145-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-146-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-147-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-148-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-149-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-150-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-151-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-152-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-153-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-154-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-155-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-156-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-157-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-158-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-159-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-160-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-161-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-162-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-163-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-164-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-165-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-166-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-167-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-168-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-169-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-170-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-143-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-172-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-173-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-174-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-175-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-125-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-126-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-127-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-128-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-129-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-130-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-131-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-191-0x0000000001000000-0x00000000021D5000-memory.dmpFilesize
17.8MB
-
memory/1744-132-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-134-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-135-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-141-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-140-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-136-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-142-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-138-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1744-139-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/1884-337-0x0000000000000000-mapping.dmp
-
memory/3724-350-0x0000000000000000-mapping.dmp
-
memory/3876-333-0x0000000000000000-mapping.dmp
-
memory/4844-262-0x0000000005300000-0x00000000057FE000-memory.dmpFilesize
5.0MB
-
memory/4844-180-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-176-0x0000000000000000-mapping.dmp
-
memory/4844-259-0x0000000000280000-0x000000000057C000-memory.dmpFilesize
3.0MB
-
memory/4844-184-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-264-0x0000000004E00000-0x0000000004E92000-memory.dmpFilesize
584KB
-
memory/4844-265-0x0000000004EA0000-0x0000000004F3C000-memory.dmpFilesize
624KB
-
memory/4844-190-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-193-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-195-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-270-0x0000000005800000-0x0000000005F48000-memory.dmpFilesize
7.3MB
-
memory/4844-188-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-301-0x0000000006190000-0x000000000619A000-memory.dmpFilesize
40KB
-
memory/4844-186-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4844-316-0x000000000A650000-0x000000000A752000-memory.dmpFilesize
1.0MB
-
memory/4844-178-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-189-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-187-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-192-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-179-0x0000000000000000-mapping.dmp
-
memory/4996-194-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-183-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-182-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-196-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-185-0x0000000077540000-0x00000000776CE000-memory.dmpFilesize
1.6MB
-
memory/4996-230-0x0000000000EE0000-0x0000000000EF2000-memory.dmpFilesize
72KB
-
memory/5108-435-0x0000000000000000-mapping.dmp