Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
27-10-2022 06:32
Static task
static1
Behavioral task
behavioral1
Sample
4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe
Resource
win10-20220901-en
General
-
Target
4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe
-
Size
256KB
-
MD5
46842227fe8dc2f59e75185c07b5c3a9
-
SHA1
8445e287a3aa479322d394dbcca711b0fb82258a
-
SHA256
4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9
-
SHA512
8d4199d3dd4bd530cc3a33cb3ddfbed814e3bf197a91f11760d365c92b4a836c825b23018b834f35d832bd92efff267c120422d6ccb4ea54e8212a428f520089
-
SSDEEP
6144:qjXl5+a4MrjQrgCn1KaLU2NnalvKNcgC:qjXua4M3fCn1Ka4Q2KN5C
Malware Config
Extracted
djvu
http://winnlinne.com/lancer/get.php
-
extension
.nury
-
offline_id
KFBzXY7hTnWvKHIgFKUOR1MsE6RDJJwQPj1ozPt1
-
payload_url
http://uaery.top/dl/build2.exe
http://winnlinne.com/files/1/build3.exe
-
ransomnote
ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-IfeNgr671e Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: support@fishmail.top Reserve e-mail address to contact us: datarestorehelp@airmail.cc Your personal ID: 0589Jhyjd
Extracted
vidar
55.2
1752
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
1752
Extracted
redline
mario23_10
167.235.252.160:10642
-
auth_value
eca57cfb5172f71dc45986763bb98942
Extracted
danabot
-
embedded_hash
BBBB0DB8CB7E6D152424535822E445A7
-
type
loader
Extracted
vidar
55.2
517
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
517
Signatures
-
Detected Djvu ransomware 7 IoCs
Processes:
resource yara_rule behavioral1/memory/4364-449-0x00000000022B0000-0x00000000023CB000-memory.dmp family_djvu behavioral1/memory/19788-474-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/19788-632-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/19788-747-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/19788-804-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu behavioral1/memory/102300-871-0x0000000000424141-mapping.dmp family_djvu behavioral1/memory/102300-946-0x0000000000400000-0x0000000000537000-memory.dmp family_djvu -
Detects Smokeloader packer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2732-148-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader behavioral1/memory/2996-234-0x00000000008D0000-0x00000000008D9000-memory.dmp family_smokeloader behavioral1/memory/3404-352-0x00000000001E0000-0x00000000001E9000-memory.dmp family_smokeloader -
Djvu Ransomware
Ransomware which is a variant of the STOP family.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/101944-565-0x00000000051DADEE-mapping.dmp family_redline behavioral1/memory/101944-665-0x0000000005180000-0x00000000051E0000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
179F.exe1974.exe1D6D.exe2EE4.exe34C1.exe403B.exe2EE4.exeCA8B.exe2EE4.exe2EE4.exebuild2.exebuild3.exebuild2.exemstsca.exepid process 3404 179F.exe 1108 1974.exe 2996 1D6D.exe 4364 2EE4.exe 4852 34C1.exe 4964 403B.exe 19788 2EE4.exe 102168 CA8B.exe 4272 2EE4.exe 102300 2EE4.exe 102340 build2.exe 102012 build3.exe 102204 build2.exe 93588 mstsca.exe -
Deletes itself 1 IoCs
Processes:
pid process 2108 -
Loads dropped DLL 4 IoCs
Processes:
regsvr32.exe34C1.exepid process 1336 regsvr32.exe 4852 34C1.exe 4852 34C1.exe 4852 34C1.exe -
Modifies file permissions 1 TTPs 1 IoCs
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
2EE4.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows\CurrentVersion\Run\SysHelper = "\"C:\\Users\\Admin\\AppData\\Local\\db3682ae-f4ad-4dfe-afc7-0069cfdea416\\2EE4.exe\" --AutoStart" 2EE4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 53 api.2ip.ua 16 api.2ip.ua 17 api.2ip.ua -
Suspicious use of SetThreadContext 4 IoCs
Processes:
2EE4.exe403B.exe2EE4.exebuild2.exedescription pid process target process PID 4364 set thread context of 19788 4364 2EE4.exe 2EE4.exe PID 4964 set thread context of 101944 4964 403B.exe vbc.exe PID 4272 set thread context of 102300 4272 2EE4.exe 2EE4.exe PID 102340 set thread context of 102204 102340 build2.exe build2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3572 3404 WerFault.exe 179F.exe 102240 4964 WerFault.exe 403B.exe 1360 4852 WerFault.exe 34C1.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
1974.exe4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe1D6D.exedescription ioc process Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1D6D.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1974.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1D6D.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1D6D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 1974.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
34C1.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 34C1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 34C1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 102088 schtasks.exe 2092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exepid process 2732 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe 2732 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 2108 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2108 -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe1D6D.exe1974.exepid process 2732 4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe 2108 2108 2108 2108 2996 1D6D.exe 1108 1974.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
Processes:
vbc.exedescription pid process Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeDebugPrivilege 101944 vbc.exe Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 Token: SeShutdownPrivilege 2108 Token: SeCreatePagefilePrivilege 2108 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exe2EE4.exe403B.exe2EE4.exeCA8B.exe2EE4.exedescription pid process target process PID 2108 wrote to memory of 3404 2108 179F.exe PID 2108 wrote to memory of 3404 2108 179F.exe PID 2108 wrote to memory of 3404 2108 179F.exe PID 2108 wrote to memory of 1108 2108 1974.exe PID 2108 wrote to memory of 1108 2108 1974.exe PID 2108 wrote to memory of 1108 2108 1974.exe PID 2108 wrote to memory of 2996 2108 1D6D.exe PID 2108 wrote to memory of 2996 2108 1D6D.exe PID 2108 wrote to memory of 2996 2108 1D6D.exe PID 2108 wrote to memory of 4896 2108 regsvr32.exe PID 2108 wrote to memory of 4896 2108 regsvr32.exe PID 4896 wrote to memory of 1336 4896 regsvr32.exe regsvr32.exe PID 4896 wrote to memory of 1336 4896 regsvr32.exe regsvr32.exe PID 4896 wrote to memory of 1336 4896 regsvr32.exe regsvr32.exe PID 2108 wrote to memory of 4364 2108 2EE4.exe PID 2108 wrote to memory of 4364 2108 2EE4.exe PID 2108 wrote to memory of 4364 2108 2EE4.exe PID 2108 wrote to memory of 4852 2108 34C1.exe PID 2108 wrote to memory of 4852 2108 34C1.exe PID 2108 wrote to memory of 4852 2108 34C1.exe PID 2108 wrote to memory of 4964 2108 403B.exe PID 2108 wrote to memory of 4964 2108 403B.exe PID 2108 wrote to memory of 4964 2108 403B.exe PID 2108 wrote to memory of 4644 2108 explorer.exe PID 2108 wrote to memory of 4644 2108 explorer.exe PID 2108 wrote to memory of 4644 2108 explorer.exe PID 2108 wrote to memory of 4644 2108 explorer.exe PID 2108 wrote to memory of 3984 2108 explorer.exe PID 2108 wrote to memory of 3984 2108 explorer.exe PID 2108 wrote to memory of 3984 2108 explorer.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4364 wrote to memory of 19788 4364 2EE4.exe 2EE4.exe PID 4964 wrote to memory of 101944 4964 403B.exe vbc.exe PID 4964 wrote to memory of 101944 4964 403B.exe vbc.exe PID 4964 wrote to memory of 101944 4964 403B.exe vbc.exe PID 4964 wrote to memory of 101944 4964 403B.exe vbc.exe PID 4964 wrote to memory of 101944 4964 403B.exe vbc.exe PID 19788 wrote to memory of 101940 19788 2EE4.exe icacls.exe PID 19788 wrote to memory of 101940 19788 2EE4.exe icacls.exe PID 19788 wrote to memory of 101940 19788 2EE4.exe icacls.exe PID 2108 wrote to memory of 102168 2108 CA8B.exe PID 2108 wrote to memory of 102168 2108 CA8B.exe PID 2108 wrote to memory of 102168 2108 CA8B.exe PID 19788 wrote to memory of 4272 19788 2EE4.exe 2EE4.exe PID 19788 wrote to memory of 4272 19788 2EE4.exe 2EE4.exe PID 19788 wrote to memory of 4272 19788 2EE4.exe 2EE4.exe PID 102168 wrote to memory of 67728 102168 CA8B.exe appidtel.exe PID 102168 wrote to memory of 67728 102168 CA8B.exe appidtel.exe PID 102168 wrote to memory of 67728 102168 CA8B.exe appidtel.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe PID 4272 wrote to memory of 102300 4272 2EE4.exe 2EE4.exe -
outlook_office_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe -
outlook_win_path 1 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe"C:\Users\Admin\AppData\Local\Temp\4df0009c6ed1c8d6c54a7e5294126c5fa64d80f8bbd2817637c14166526153d9.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\179F.exeC:\Users\Admin\AppData\Local\Temp\179F.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3404 -s 4762⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\1974.exeC:\Users\Admin\AppData\Local\Temp\1974.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\1D6D.exeC:\Users\Admin\AppData\Local\Temp\1D6D.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2936.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\2936.dll2⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeC:\Users\Admin\AppData\Local\Temp\2EE4.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeC:\Users\Admin\AppData\Local\Temp\2EE4.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\icacls.exeicacls "C:\Users\Admin\AppData\Local\db3682ae-f4ad-4dfe-afc7-0069cfdea416" /deny *S-1-1-0:(OI)(CI)(DE,DC)3⤵
- Modifies file permissions
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exe"C:\Users\Admin\AppData\Local\Temp\2EE4.exe" --Admin IsNotAutoStart IsNotTask3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exe"C:\Users\Admin\AppData\Local\Temp\2EE4.exe" --Admin IsNotAutoStart IsNotTask4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exe"C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exe"C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exe"6⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build3.exe"C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build3.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\34C1.exeC:\Users\Admin\AppData\Local\Temp\34C1.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 17242⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\403B.exeC:\Users\Admin\AppData\Local\Temp\403B.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 1971202⤵
- Program crash
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Accesses Microsoft Outlook profiles
- outlook_office_path
- outlook_win_path
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\CA8B.exeC:\Users\Admin\AppData\Local\Temp\CA8B.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\appidtel.exeC:\Windows\system32\appidtel.exe2⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
2KB
MD534feb9279587011e5bd1bc825e7d2943
SHA1d7ad421c0f4c305936e4b6b1ee3b4d73dea0b094
SHA25696b9b67b871e3adbab0a5b0ba635679443636a97c7dd2f19fec1b45a2dd36a5d
SHA5129fd6ff36a966661ab2ccd5e0c2dd0b24661fc87686fe039db97f79eecbb1504ac9735462b16d8657ef900e3bc405c149ff98c32aa1c682b83d2ffd2382b5f285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
4KB
MD5f7dcb24540769805e5bb30d193944dce
SHA1e26c583c562293356794937d9e2e6155d15449ee
SHA2566b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea
SHA512cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
1KB
MD5d9a93ddf4a07b6efa9e706f12c2931dd
SHA129f3030ca4c32bf5929c5b14dc24e3d5f7b96261
SHA256d637153e9fffb1edfdec7cf5532b13f1575278470cfd3b7e2483cb5bb1f21ba9
SHA51297dbab491a5c61293da64d5ce9c08f2fe1c1b892e11f82d3c4c26ef7c153e631a3ca0e51f6d1d554c0d79a97f54a834b0e64eed8c803bb04c81b33f8988d8148
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850DFilesize
488B
MD56f6d8967ae2030b85402a3d3d82ed394
SHA17762b669053845aa39410e5117e2242c3e094f8f
SHA256f62a907441051f6d8cda1a35e256fe2f9e45a075e29176fe0df46ccd1f4a0b0d
SHA51246ef975059539b178926bfa43cf8264d34c01afdc978aef5bfbbe6505acc14164754a996cb20b76621fa723f1474026377e3b61d687330261ab525981ab13935
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157Filesize
340B
MD50921f69aea48f6ae0a482801bbac7ef8
SHA1aff218c20683ded6c905aa0929958b25a0d564c7
SHA25648a0687bc70aeb2bceb895d76ec5c9b3103196fd837d0db4aec90e381bcb253e
SHA51228a2fad1d143fc6dfd9141896836a52be411d7a6dae1b17a008744efbe04897b826831efd948534556376573dcfcdf7b59d2bd3e2d3f312d8b6dff07b1a039fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711EFilesize
482B
MD526afa6e0cd6e16dde27028c35f85f0ea
SHA1c1da035c7ee656d97f508c346b2e8901c197e5bb
SHA2569bf6487175f79d482acfa796914ad9164d06b29060ab597b27912353dadf83a4
SHA512f1a6bf9154c41fa80afd427f50a8d55740ce0acfadb8cabc07e584c66aec2e6a72f4db99da44867e2d0f421ca00ef9f67d640847aff6dfeb3b159f8ce2ef497e
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exeFilesize
338KB
MD514c57b9f9d9fd0dfdd6941cd396f447a
SHA1679f2196a71b5007c4ed5a1888dc2a08af554ac5
SHA25650b4e60ae4821dc249f2a2c2477818f0736a23a8f8968f34bb5bfb3c64a00722
SHA512374c826db5a7f3e636b65e98e2dd12bed57ce80db5d8f1965ad9ae13333846fca3fb3138f7cfbb8843c4f78b0b8c5cab451a1af94e9594e45e042ba8cc2520a4
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exeFilesize
338KB
MD514c57b9f9d9fd0dfdd6941cd396f447a
SHA1679f2196a71b5007c4ed5a1888dc2a08af554ac5
SHA25650b4e60ae4821dc249f2a2c2477818f0736a23a8f8968f34bb5bfb3c64a00722
SHA512374c826db5a7f3e636b65e98e2dd12bed57ce80db5d8f1965ad9ae13333846fca3fb3138f7cfbb8843c4f78b0b8c5cab451a1af94e9594e45e042ba8cc2520a4
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build2.exeFilesize
338KB
MD514c57b9f9d9fd0dfdd6941cd396f447a
SHA1679f2196a71b5007c4ed5a1888dc2a08af554ac5
SHA25650b4e60ae4821dc249f2a2c2477818f0736a23a8f8968f34bb5bfb3c64a00722
SHA512374c826db5a7f3e636b65e98e2dd12bed57ce80db5d8f1965ad9ae13333846fca3fb3138f7cfbb8843c4f78b0b8c5cab451a1af94e9594e45e042ba8cc2520a4
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\7f141afa-6b5f-4a96-8558-0830c84a6948\build3.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Local\Temp\179F.exeFilesize
256KB
MD568e5ea9df31d753e539b818f8be01f2c
SHA10de793e7116d638f0ce0480e1b2aeb09a2e499a5
SHA256a527331de5c2dc5bf888ae8f0899ba4d7cbb64a5b242e8b2358e89bb8812bf56
SHA512c88bb22d4591111673805d613b91e791eee764e8a7551b2abe853e62dbf25e6461983acf16feb34ef6fc2388a629f045c80007ba69d80494773ed6cabf4b2c38
-
C:\Users\Admin\AppData\Local\Temp\179F.exeFilesize
256KB
MD568e5ea9df31d753e539b818f8be01f2c
SHA10de793e7116d638f0ce0480e1b2aeb09a2e499a5
SHA256a527331de5c2dc5bf888ae8f0899ba4d7cbb64a5b242e8b2358e89bb8812bf56
SHA512c88bb22d4591111673805d613b91e791eee764e8a7551b2abe853e62dbf25e6461983acf16feb34ef6fc2388a629f045c80007ba69d80494773ed6cabf4b2c38
-
C:\Users\Admin\AppData\Local\Temp\1974.exeFilesize
255KB
MD56f5438ba149808c0c45d41c53b85605c
SHA15ac0cd3175f06d71ae0c1255ed7ca56ee1d0a79a
SHA2567a08f37dca495e09159129706d2213c58dce3fc376594a8792265803f7e64995
SHA512633a4b6de05757ede3bfeff938cfde8a44570dad4dba06d07ca5b12c19d282f6f981216ab8993df705449abf4e6ea14d1958fb3bde0b4cca4a708b2940d3e289
-
C:\Users\Admin\AppData\Local\Temp\1974.exeFilesize
255KB
MD56f5438ba149808c0c45d41c53b85605c
SHA15ac0cd3175f06d71ae0c1255ed7ca56ee1d0a79a
SHA2567a08f37dca495e09159129706d2213c58dce3fc376594a8792265803f7e64995
SHA512633a4b6de05757ede3bfeff938cfde8a44570dad4dba06d07ca5b12c19d282f6f981216ab8993df705449abf4e6ea14d1958fb3bde0b4cca4a708b2940d3e289
-
C:\Users\Admin\AppData\Local\Temp\1D6D.exeFilesize
223KB
MD5afb3c96cbc44f897b696f8afdc798404
SHA13750d306ab7df66e20d9ff31ec8997fee7296f16
SHA2562aa46bd5fb727aa41a17734c4037dc8b315f899457ec635598c8d7d9780196ff
SHA512e13815bd8f35c767ed2d18df5737d2e0480f0a24c7b84ce0526558cd4a2d9117ee3351b17723ae35efa02d60443a54b73ca9945cb47524b823353fe51fb56554
-
C:\Users\Admin\AppData\Local\Temp\1D6D.exeFilesize
223KB
MD5afb3c96cbc44f897b696f8afdc798404
SHA13750d306ab7df66e20d9ff31ec8997fee7296f16
SHA2562aa46bd5fb727aa41a17734c4037dc8b315f899457ec635598c8d7d9780196ff
SHA512e13815bd8f35c767ed2d18df5737d2e0480f0a24c7b84ce0526558cd4a2d9117ee3351b17723ae35efa02d60443a54b73ca9945cb47524b823353fe51fb56554
-
C:\Users\Admin\AppData\Local\Temp\2936.dllFilesize
2.9MB
MD529aed617847ea377543d6ee9b6f8e4dc
SHA1d33edffe7aa23884db4e34abf4f7bb5c061beff8
SHA2560e2d36b89cc18e35919d132a0bfe21da4bbbe2d4c884739e4437b37057316c88
SHA512719acd6c61597b4e071fcd8e69d249c9fa31b8978f5d08f18d18c149748708ef4230c1a9797273b9a754d6036109d39adaf5bb5ed047822966c0baedf4a1e688
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Local\Temp\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Local\Temp\34C1.exeFilesize
327KB
MD5d15781d757edf0a03934b606371342ba
SHA11b21111f86709a97bf5de34d3797219d00a75038
SHA2562ecfd1b2898479688cc8374b178ccc7f75142021dcc40787694faad198c693e4
SHA512ce056282b54538286875bd790aecb16d4eca4de297721247653be9fd3a42c35fcef89efc27c73276b944d19b45e14239c69d01846a83fc179c788b13ba13b4e7
-
C:\Users\Admin\AppData\Local\Temp\34C1.exeFilesize
327KB
MD5d15781d757edf0a03934b606371342ba
SHA11b21111f86709a97bf5de34d3797219d00a75038
SHA2562ecfd1b2898479688cc8374b178ccc7f75142021dcc40787694faad198c693e4
SHA512ce056282b54538286875bd790aecb16d4eca4de297721247653be9fd3a42c35fcef89efc27c73276b944d19b45e14239c69d01846a83fc179c788b13ba13b4e7
-
C:\Users\Admin\AppData\Local\Temp\403B.exeFilesize
1.6MB
MD5ca1c6c4ab17df66febd0fbb52e77e543
SHA1f0312684ec973dc1a062b6aa087b2a33b8d49ad1
SHA256474b143cd92f6a058630687023ce314592ab92775f26257afc7c44e95fef3b1e
SHA512268023576c90cddba97fa2f5efbd887a14efe16863f8bbd6b2f193278e4391f6cb4e3d1e51e8f86e943bf1d0fe9e77e3df5f6e11347ca09a2d8d2babfcda4c45
-
C:\Users\Admin\AppData\Local\Temp\403B.exeFilesize
1.6MB
MD5ca1c6c4ab17df66febd0fbb52e77e543
SHA1f0312684ec973dc1a062b6aa087b2a33b8d49ad1
SHA256474b143cd92f6a058630687023ce314592ab92775f26257afc7c44e95fef3b1e
SHA512268023576c90cddba97fa2f5efbd887a14efe16863f8bbd6b2f193278e4391f6cb4e3d1e51e8f86e943bf1d0fe9e77e3df5f6e11347ca09a2d8d2babfcda4c45
-
C:\Users\Admin\AppData\Local\Temp\CA8B.exeFilesize
1.3MB
MD5b17cbffa171dae3d2a741c8471f1a44c
SHA1dc1f7c3e4e4229233bc8f40caceb6aac3f00e48c
SHA2564c70eaca38a7119e392eb0007dff27793fcaab04d1273b9dc371149f489ca11c
SHA512f424e45bca054e17b321972e197cc85b924b8c774f338581446d46afd818c7f66fd49424ace747d8e466a1b588218c3b5c9df187aa7d2abd3a152c54094b23fe
-
C:\Users\Admin\AppData\Local\Temp\CA8B.exeFilesize
1.3MB
MD5b17cbffa171dae3d2a741c8471f1a44c
SHA1dc1f7c3e4e4229233bc8f40caceb6aac3f00e48c
SHA2564c70eaca38a7119e392eb0007dff27793fcaab04d1273b9dc371149f489ca11c
SHA512f424e45bca054e17b321972e197cc85b924b8c774f338581446d46afd818c7f66fd49424ace747d8e466a1b588218c3b5c9df187aa7d2abd3a152c54094b23fe
-
C:\Users\Admin\AppData\Local\db3682ae-f4ad-4dfe-afc7-0069cfdea416\2EE4.exeFilesize
729KB
MD589e06829a02414a918bf0a97bf36b3bd
SHA118d09743f77fe6f95f2a349eb5812bdcc16a4847
SHA256d701165c08abb0e6da8bdb5c734c3d32c86c300f0e1030610f3fbf995700120e
SHA51292859e301adb7056a3d07f8e5b32c73335eebf1b8f04457cb36746a0401e955ac7b304f873325935d915b258498729f1b3f1ac9bcf092e10edd001dca9fcee87
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exeFilesize
9KB
MD59ead10c08e72ae41921191f8db39bc16
SHA1abe3bce01cd34afc88e2c838173f8c2bd0090ae1
SHA2568d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0
SHA512aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\ProgramData\sqlite3.dllFilesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
\Users\Admin\AppData\Local\Temp\2936.dllFilesize
2.9MB
MD529aed617847ea377543d6ee9b6f8e4dc
SHA1d33edffe7aa23884db4e34abf4f7bb5c061beff8
SHA2560e2d36b89cc18e35919d132a0bfe21da4bbbe2d4c884739e4437b37057316c88
SHA512719acd6c61597b4e071fcd8e69d249c9fa31b8978f5d08f18d18c149748708ef4230c1a9797273b9a754d6036109d39adaf5bb5ed047822966c0baedf4a1e688
-
memory/1108-440-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/1108-176-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-175-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-470-0x0000000002CC0000-0x0000000002D6E000-memory.dmpFilesize
696KB
-
memory/1108-169-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-173-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-172-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-174-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-177-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1108-534-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/1108-166-0x0000000000000000-mapping.dmp
-
memory/1336-512-0x00000000053D0000-0x0000000005518000-memory.dmpFilesize
1.3MB
-
memory/1336-200-0x0000000000000000-mapping.dmp
-
memory/1336-201-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1336-202-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/1336-508-0x0000000004FF0000-0x000000000527E000-memory.dmpFilesize
2.6MB
-
memory/1336-780-0x00000000053D0000-0x0000000005518000-memory.dmpFilesize
1.3MB
-
memory/2092-1480-0x0000000000000000-mapping.dmp
-
memory/2108-308-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2108-269-0x00000000015D0000-0x00000000015E0000-memory.dmpFilesize
64KB
-
memory/2108-696-0x0000000001580000-0x0000000001590000-memory.dmpFilesize
64KB
-
memory/2108-685-0x00000000034C0000-0x00000000034D0000-memory.dmpFilesize
64KB
-
memory/2108-473-0x0000000001590000-0x00000000015A0000-memory.dmpFilesize
64KB
-
memory/2108-467-0x0000000001580000-0x0000000001590000-memory.dmpFilesize
64KB
-
memory/2108-443-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2108-405-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2108-358-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2108-339-0x00000000034C0000-0x00000000034D0000-memory.dmpFilesize
64KB
-
memory/2108-333-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2108-299-0x0000000003490000-0x00000000034A0000-memory.dmpFilesize
64KB
-
memory/2732-137-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-150-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-121-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-122-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-123-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-124-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-126-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-127-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-128-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-129-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-130-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-131-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-132-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-133-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-157-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/2732-134-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-156-0x0000000002DD1000-0x0000000002DE7000-memory.dmpFilesize
88KB
-
memory/2732-155-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/2732-135-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-136-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-138-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-154-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-139-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-140-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-153-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-141-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-120-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-152-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-142-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-143-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-125-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-144-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-145-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-146-0x0000000002DD1000-0x0000000002DE7000-memory.dmpFilesize
88KB
-
memory/2732-147-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-148-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/2732-149-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2732-151-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-190-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-193-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-184-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-425-0x0000000000996000-0x00000000009A7000-memory.dmpFilesize
68KB
-
memory/2996-430-0x0000000000400000-0x0000000000595000-memory.dmpFilesize
1.6MB
-
memory/2996-183-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-192-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-264-0x0000000000400000-0x0000000000595000-memory.dmpFilesize
1.6MB
-
memory/2996-229-0x0000000000996000-0x00000000009A7000-memory.dmpFilesize
68KB
-
memory/2996-187-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-182-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-197-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-194-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-196-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-185-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-195-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-234-0x00000000008D0000-0x00000000008D9000-memory.dmpFilesize
36KB
-
memory/2996-188-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-180-0x0000000000000000-mapping.dmp
-
memory/2996-191-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/2996-186-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-160-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-158-0x0000000000000000-mapping.dmp
-
memory/3404-161-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-651-0x0000000002C30000-0x0000000002CDE000-memory.dmpFilesize
696KB
-
memory/3404-352-0x00000000001E0000-0x00000000001E9000-memory.dmpFilesize
36KB
-
memory/3404-671-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/3404-399-0x0000000000400000-0x0000000002C2E000-memory.dmpFilesize
40.2MB
-
memory/3404-345-0x0000000002C30000-0x0000000002CDE000-memory.dmpFilesize
696KB
-
memory/3404-163-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-165-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-162-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-167-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3404-164-0x0000000076F80000-0x000000007710E000-memory.dmpFilesize
1.6MB
-
memory/3984-377-0x00000000012B0000-0x00000000012BC000-memory.dmpFilesize
48KB
-
memory/3984-351-0x0000000000000000-mapping.dmp
-
memory/4272-870-0x0000000000620000-0x000000000076A000-memory.dmpFilesize
1.3MB
-
memory/4272-803-0x0000000000000000-mapping.dmp
-
memory/4364-446-0x0000000000850000-0x00000000008E3000-memory.dmpFilesize
588KB
-
memory/4364-449-0x00000000022B0000-0x00000000023CB000-memory.dmpFilesize
1.1MB
-
memory/4364-207-0x0000000000000000-mapping.dmp
-
memory/4644-562-0x0000000002940000-0x00000000029AB000-memory.dmpFilesize
428KB
-
memory/4644-544-0x0000000002C00000-0x0000000002C75000-memory.dmpFilesize
468KB
-
memory/4644-674-0x0000000002940000-0x00000000029AB000-memory.dmpFilesize
428KB
-
memory/4644-327-0x0000000000000000-mapping.dmp
-
memory/4852-482-0x00000000005B0000-0x00000000006FA000-memory.dmpFilesize
1.3MB
-
memory/4852-233-0x0000000000000000-mapping.dmp
-
memory/4852-479-0x00000000008E6000-0x0000000000912000-memory.dmpFilesize
176KB
-
memory/4852-700-0x00000000005B0000-0x00000000006FA000-memory.dmpFilesize
1.3MB
-
memory/4852-698-0x00000000008E6000-0x0000000000912000-memory.dmpFilesize
176KB
-
memory/4852-701-0x0000000000400000-0x00000000005B0000-memory.dmpFilesize
1.7MB
-
memory/4852-486-0x0000000000400000-0x00000000005B0000-memory.dmpFilesize
1.7MB
-
memory/4896-198-0x0000000000000000-mapping.dmp
-
memory/4964-293-0x0000000000000000-mapping.dmp
-
memory/19788-632-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/19788-747-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/19788-804-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/19788-474-0x0000000000424141-mapping.dmp
-
memory/67728-853-0x0000000000000000-mapping.dmp
-
memory/101940-725-0x0000000000000000-mapping.dmp
-
memory/101944-709-0x000000000F2F0000-0x000000000F8F6000-memory.dmpFilesize
6.0MB
-
memory/101944-779-0x000000000F150000-0x000000000F1E2000-memory.dmpFilesize
584KB
-
memory/101944-565-0x00000000051DADEE-mapping.dmp
-
memory/101944-714-0x000000000EE00000-0x000000000EE3E000-memory.dmpFilesize
248KB
-
memory/101944-716-0x000000000EF80000-0x000000000EFCB000-memory.dmpFilesize
300KB
-
memory/101944-785-0x000000000F260000-0x000000000F2C6000-memory.dmpFilesize
408KB
-
memory/101944-951-0x0000000010520000-0x00000000106E2000-memory.dmpFilesize
1.8MB
-
memory/101944-681-0x0000000006F60000-0x0000000006F66000-memory.dmpFilesize
24KB
-
memory/101944-665-0x0000000005180000-0x00000000051E0000-memory.dmpFilesize
384KB
-
memory/101944-712-0x000000000EDA0000-0x000000000EDB2000-memory.dmpFilesize
72KB
-
memory/101944-710-0x000000000EE70000-0x000000000EF7A000-memory.dmpFilesize
1.0MB
-
memory/101944-781-0x000000000FE00000-0x00000000102FE000-memory.dmpFilesize
5.0MB
-
memory/102012-1075-0x0000000000000000-mapping.dmp
-
memory/102088-1163-0x0000000000000000-mapping.dmp
-
memory/102168-850-0x0000000004B80000-0x0000000004E4C000-memory.dmpFilesize
2.8MB
-
memory/102168-762-0x0000000000000000-mapping.dmp
-
memory/102168-846-0x00000000030B0000-0x00000000031DB000-memory.dmpFilesize
1.2MB
-
memory/102168-887-0x0000000000400000-0x0000000002D3B000-memory.dmpFilesize
41.2MB
-
memory/102204-1181-0x000000000042005C-mapping.dmp
-
memory/102300-871-0x0000000000424141-mapping.dmp
-
memory/102300-946-0x0000000000400000-0x0000000000537000-memory.dmpFilesize
1.2MB
-
memory/102340-1035-0x0000000000000000-mapping.dmp