Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
30-10-2022 06:00
Static task
static1
General
-
Target
c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe
-
Size
286KB
-
MD5
6af8edda3ba74858ffed60c6a4f1bfd2
-
SHA1
aa41f583fb12db55eab39d1a0aad3fba254606dd
-
SHA256
c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61
-
SHA512
230f3296fc5228af98cc92477eb43f7fb5d0050667240dafaf161784dfba040a28aadb7eebe407e68f9ace5efac4b700db67dba85741feac21fa0dc7d64e86ee
-
SSDEEP
6144:QuUzvxLlfMCNK5rP4F5/I7W83SawB8a8xn1w:pUzp9PKhPa5/N83SawCa5
Malware Config
Extracted
nymaim
45.139.105.171
85.31.46.167
Extracted
vidar
55.3
937
https://t.me/slivetalks
https://c.im/@xinibin420
-
profile_id
937
Signatures
-
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-146-0x0000000002C90000-0x0000000002C99000-memory.dmp family_smokeloader -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exeflow pid process 71 4956 rundll32.exe 72 4956 rundll32.exe 74 4956 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
39BD.exe52D4.exe6B6E.exe7439.exeA02C.exe39BD.exe39BD.exe39BD.exe39BD.exepid process 4792 39BD.exe 1492 52D4.exe 2340 6B6E.exe 4244 7439.exe 4544 A02C.exe 3796 39BD.exe 4252 39BD.exe 4392 39BD.exe 4532 39BD.exe -
Deletes itself 1 IoCs
Processes:
pid process 3056 -
Loads dropped DLL 9 IoCs
Processes:
7439.exerundll32.exerundll32.exerundll32.exerundll32.exepid process 4244 7439.exe 4244 7439.exe 4244 7439.exe 4956 rundll32.exe 1208 rundll32.exe 1208 rundll32.exe 4908 rundll32.exe 4772 rundll32.exe 4772 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
A02C.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" A02C.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce A02C.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
52D4.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 52D4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 50 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3520 4792 WerFault.exe 39BD.exe 3720 2340 WerFault.exe 6B6E.exe 4956 4792 WerFault.exe 39BD.exe 4588 4792 WerFault.exe 39BD.exe 4692 2340 WerFault.exe 6B6E.exe 4760 4792 WerFault.exe 39BD.exe 4024 4792 WerFault.exe 39BD.exe 924 2340 WerFault.exe 6B6E.exe 232 2340 WerFault.exe 6B6E.exe 32 4792 WerFault.exe 39BD.exe 4384 4792 WerFault.exe 39BD.exe 620 2340 WerFault.exe 6B6E.exe 4368 2340 WerFault.exe 6B6E.exe 2904 2340 WerFault.exe 6B6E.exe 2144 2340 WerFault.exe 6B6E.exe 2484 4792 WerFault.exe 39BD.exe 392 2340 WerFault.exe 6B6E.exe 4312 3796 WerFault.exe 39BD.exe 3032 3796 WerFault.exe 39BD.exe 4984 4244 WerFault.exe 7439.exe 844 3796 WerFault.exe 39BD.exe 4488 3796 WerFault.exe 39BD.exe 3216 3796 WerFault.exe 39BD.exe 564 3796 WerFault.exe 39BD.exe 4524 3796 WerFault.exe 39BD.exe 3520 3796 WerFault.exe 39BD.exe 4740 4252 WerFault.exe 39BD.exe 3168 4252 WerFault.exe 39BD.exe 3340 4252 WerFault.exe 39BD.exe 3932 4252 WerFault.exe 39BD.exe 196 4252 WerFault.exe 39BD.exe 3088 4252 WerFault.exe 39BD.exe 684 4252 WerFault.exe 39BD.exe 1812 4252 WerFault.exe 39BD.exe 5080 4392 WerFault.exe 39BD.exe 4860 4392 WerFault.exe 39BD.exe 1948 4392 WerFault.exe 39BD.exe 4444 4392 WerFault.exe 39BD.exe 3952 4392 WerFault.exe 39BD.exe 4600 4392 WerFault.exe 39BD.exe 4540 4392 WerFault.exe 39BD.exe 4376 4392 WerFault.exe 39BD.exe 2140 4532 WerFault.exe 39BD.exe 1900 4532 WerFault.exe 39BD.exe 4220 4532 WerFault.exe 39BD.exe 2864 4532 WerFault.exe 39BD.exe 1620 4532 WerFault.exe 39BD.exe 3032 4532 WerFault.exe 39BD.exe 4472 4532 WerFault.exe 39BD.exe 4476 4532 WerFault.exe 39BD.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
7439.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7439.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7439.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exepid process 2016 c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe 2016 c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3056 -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exepid process 2016 c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 Token: SeShutdownPrivilege 3056 Token: SeCreatePagefilePrivilege 3056 -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
A02C.exe39BD.execmd.exe39BD.exe39BD.exe39BD.exedescription pid process target process PID 3056 wrote to memory of 4792 3056 39BD.exe PID 3056 wrote to memory of 4792 3056 39BD.exe PID 3056 wrote to memory of 4792 3056 39BD.exe PID 3056 wrote to memory of 1492 3056 52D4.exe PID 3056 wrote to memory of 1492 3056 52D4.exe PID 3056 wrote to memory of 1492 3056 52D4.exe PID 3056 wrote to memory of 2340 3056 6B6E.exe PID 3056 wrote to memory of 2340 3056 6B6E.exe PID 3056 wrote to memory of 2340 3056 6B6E.exe PID 3056 wrote to memory of 4244 3056 7439.exe PID 3056 wrote to memory of 4244 3056 7439.exe PID 3056 wrote to memory of 4244 3056 7439.exe PID 3056 wrote to memory of 4544 3056 A02C.exe PID 3056 wrote to memory of 4544 3056 A02C.exe PID 3056 wrote to memory of 4544 3056 A02C.exe PID 4544 wrote to memory of 3812 4544 A02C.exe dllhost.exe PID 4544 wrote to memory of 3812 4544 A02C.exe dllhost.exe PID 4544 wrote to memory of 3812 4544 A02C.exe dllhost.exe PID 4792 wrote to memory of 3796 4792 39BD.exe 39BD.exe PID 4792 wrote to memory of 3796 4792 39BD.exe 39BD.exe PID 4792 wrote to memory of 3796 4792 39BD.exe 39BD.exe PID 4544 wrote to memory of 3408 4544 A02C.exe cmd.exe PID 4544 wrote to memory of 3408 4544 A02C.exe cmd.exe PID 4544 wrote to memory of 3408 4544 A02C.exe cmd.exe PID 3408 wrote to memory of 2356 3408 cmd.exe cmd.exe PID 3408 wrote to memory of 2356 3408 cmd.exe cmd.exe PID 3408 wrote to memory of 2356 3408 cmd.exe cmd.exe PID 3796 wrote to memory of 4252 3796 39BD.exe 39BD.exe PID 3796 wrote to memory of 4252 3796 39BD.exe 39BD.exe PID 3796 wrote to memory of 4252 3796 39BD.exe 39BD.exe PID 4792 wrote to memory of 4956 4792 39BD.exe rundll32.exe PID 4792 wrote to memory of 4956 4792 39BD.exe rundll32.exe PID 4792 wrote to memory of 4956 4792 39BD.exe rundll32.exe PID 4252 wrote to memory of 4392 4252 39BD.exe 39BD.exe PID 4252 wrote to memory of 4392 4252 39BD.exe 39BD.exe PID 4252 wrote to memory of 4392 4252 39BD.exe 39BD.exe PID 4252 wrote to memory of 1208 4252 39BD.exe rundll32.exe PID 4252 wrote to memory of 1208 4252 39BD.exe rundll32.exe PID 4252 wrote to memory of 1208 4252 39BD.exe rundll32.exe PID 3796 wrote to memory of 4908 3796 39BD.exe rundll32.exe PID 3796 wrote to memory of 4908 3796 39BD.exe rundll32.exe PID 3796 wrote to memory of 4908 3796 39BD.exe rundll32.exe PID 4392 wrote to memory of 4532 4392 39BD.exe 39BD.exe PID 4392 wrote to memory of 4532 4392 39BD.exe 39BD.exe PID 4392 wrote to memory of 4532 4392 39BD.exe 39BD.exe PID 4392 wrote to memory of 4772 4392 39BD.exe rundll32.exe PID 4392 wrote to memory of 4772 4392 39BD.exe rundll32.exe PID 4392 wrote to memory of 4772 4392 39BD.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe"C:\Users\Admin\AppData\Local\Temp\c15f3ac17ea11c15b75f91cfdfb7871d6acfb656bf491a56095940ee340ffb61.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeC:\Users\Admin\AppData\Local\Temp\39BD.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 5962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 8562⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 9322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10042⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 10802⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\39BD.exe"C:\Users\Admin\AppData\Local\Temp\39BD.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 5643⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 8563⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 9243⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 9883⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 10403⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 10043⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 10523⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\39BD.exe"C:\Users\Admin\AppData\Local\Temp\39BD.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 5644⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8564⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 10004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 9684⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 10404⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 10164⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 10924⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\39BD.exe"C:\Users\Admin\AppData\Local\Temp\39BD.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 5645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9005⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9925⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 9645⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 10405⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 10805⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 10485⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\39BD.exe"C:\Users\Admin\AppData\Local\Temp\39BD.exe"5⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 5646⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 9166⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 10006⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 9686⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 10406⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 9246⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 10646⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\39BD.exe"C:\Users\Admin\AppData\Local\Temp\39BD.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 11646⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start6⤵
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start5⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 11645⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 12004⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3796 -s 8883⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start3⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 11602⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dll,start2⤵
- Blocklisted process makes network request
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\52D4.exeC:\Users\Admin\AppData\Local\Temp\52D4.exe1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
-
C:\Users\Admin\AppData\Local\Temp\6B6E.exeC:\Users\Admin\AppData\Local\Temp\6B6E.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 5362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 7362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 7762⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 8722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 8802⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 9682⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 11242⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 11322⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 11002⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\7439.exeC:\Users\Admin\AppData\Local\Temp\7439.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 17562⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\A02C.exeC:\Users\Admin\AppData\Local\Temp\A02C.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\dllhost.exedllhost vfrfgh ningggfdee2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Chrome.pdf & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd3⤵
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
3.6MB
MD5c84f631b982a55306834c0123555a199
SHA123c67574f5004e2232e5caa7d85b86ed33e51842
SHA2563e289c09004c4897bfd45aab26f9b8efeb64763a671189d472f7004ee72f100a
SHA5121c6a6c16744ab08abe40d568cd9bdcd6f39bf4d5c919f70804576f023a5a3b8354f3190c8ea75e9635fddaa55c02ca5fb561fcd0182a7889be0324ac07ab81a5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\39BD.exeFilesize
6.1MB
MD55fb645516dc59c5f35c5619c5ca77aa8
SHA1bf676068acb90fd1feea6ee34bb7bf03ceb419ed
SHA25625fec2ccde0c95ea123361b62011c202d29e955712e0b62c15b914728c548cd7
SHA5127019fce98ab70d7189cac97af461f2dd33e42b4a9ec0444a8cac852cd882ae97da41387a5a2067c9bdeb65ae724e117193e92430834f47fe5494cb9a8b0162e5
-
C:\Users\Admin\AppData\Local\Temp\52D4.exeFilesize
586KB
MD57015fcaa3bfd71f411ab92817bb1ba8e
SHA11e3805f3b09fa116960d47058a4c359ae8a3ab3d
SHA25646d6bc3be0043622a9c51c2b8731317a75b7fa324881a776f8c1c7f7947b32ad
SHA512a5efff5d7474b048bc96415a4746912389c0e95c02b7be5df4fa7ab5874a7edf595e131136aeff2270c04d0016b4a37bef53ddeb3e3c75477f76069be661a47b
-
C:\Users\Admin\AppData\Local\Temp\52D4.exeFilesize
586KB
MD57015fcaa3bfd71f411ab92817bb1ba8e
SHA11e3805f3b09fa116960d47058a4c359ae8a3ab3d
SHA25646d6bc3be0043622a9c51c2b8731317a75b7fa324881a776f8c1c7f7947b32ad
SHA512a5efff5d7474b048bc96415a4746912389c0e95c02b7be5df4fa7ab5874a7edf595e131136aeff2270c04d0016b4a37bef53ddeb3e3c75477f76069be661a47b
-
C:\Users\Admin\AppData\Local\Temp\6B6E.exeFilesize
354KB
MD5ab7e2ee57a39de7ff64a2f571ab29676
SHA1c04a95bfdf6dfc93c9c152f61d254adbdc2774cb
SHA256aae33a5c1971bc848715a660f6a878a20ff4198c244b3d58737274545f1bb17c
SHA512dbeaf88f2d9ba57f52eda543662bb298e71e59a722a8c5114b8b245d64536bf054b1aa08d452d273fd89c41e18b7d8d23a955a47a069b868ea2f7ee56b9b74b2
-
C:\Users\Admin\AppData\Local\Temp\6B6E.exeFilesize
354KB
MD5ab7e2ee57a39de7ff64a2f571ab29676
SHA1c04a95bfdf6dfc93c9c152f61d254adbdc2774cb
SHA256aae33a5c1971bc848715a660f6a878a20ff4198c244b3d58737274545f1bb17c
SHA512dbeaf88f2d9ba57f52eda543662bb298e71e59a722a8c5114b8b245d64536bf054b1aa08d452d273fd89c41e18b7d8d23a955a47a069b868ea2f7ee56b9b74b2
-
C:\Users\Admin\AppData\Local\Temp\7439.exeFilesize
349KB
MD5322e56c0800806f7b0c22a29b9621cc3
SHA109a9a0eaec8facaed1d2d8f82990fa154e80a470
SHA2569ef5e9112b6f46e3aa83394ab5cb5d7a160b80cbe31c1b179d11c6d1b17d782d
SHA512e882375c48ee3305f0afcebee7933a76c8017e670e6e76b1b8286b7357d17d39ae0dce1020c8358fae5de71591294a44e2457034181bdd860f30579615db204f
-
C:\Users\Admin\AppData\Local\Temp\7439.exeFilesize
349KB
MD5322e56c0800806f7b0c22a29b9621cc3
SHA109a9a0eaec8facaed1d2d8f82990fa154e80a470
SHA2569ef5e9112b6f46e3aa83394ab5cb5d7a160b80cbe31c1b179d11c6d1b17d782d
SHA512e882375c48ee3305f0afcebee7933a76c8017e670e6e76b1b8286b7357d17d39ae0dce1020c8358fae5de71591294a44e2457034181bdd860f30579615db204f
-
C:\Users\Admin\AppData\Local\Temp\A02C.exeFilesize
737KB
MD58d013b4129e9f90f841a494190847b31
SHA153cefb2945a37889b5442cc45aea28dea8a5ac22
SHA2565a53c1d7e6761dbe6b6ae5788cc6ffbbe78794d1eabc736251cce47c13ccfcc3
SHA512c9152eb756d1d7ecf988c275365bb4bc4e7de7286a00893b9814d65bd6693e25be9509e1f3829db93bec629c6a9cec9252f645858bef0f6ee221b913da20dfbb
-
C:\Users\Admin\AppData\Local\Temp\A02C.exeFilesize
737KB
MD58d013b4129e9f90f841a494190847b31
SHA153cefb2945a37889b5442cc45aea28dea8a5ac22
SHA2565a53c1d7e6761dbe6b6ae5788cc6ffbbe78794d1eabc736251cce47c13ccfcc3
SHA512c9152eb756d1d7ecf988c275365bb4bc4e7de7286a00893b9814d65bd6693e25be9509e1f3829db93bec629c6a9cec9252f645858bef0f6ee221b913da20dfbb
-
C:\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chicago.pdfFilesize
924KB
MD5aabe6813697af03369aa450bb4436f55
SHA16e2ab9fdebe157325f1e83318bfa502b83b164ad
SHA256969066f1533d7f8295294934cae842d6e04bf995347a926f59eab567554699a1
SHA512bc169c94564c22e40a446dd6c64de09f98bf09f6b0ec238ef252c29e1e2e9c10a0bef8cf8fca1192f5a7d4cd7afe4c4fa4597a3307b7c71916dda73d3fb2f188
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Chrome.pdfFilesize
11KB
MD5615333778325ed2e1d9deff0a5039a15
SHA140ab327c890707a9c9a5c2a10a6cdea8649a3341
SHA256dc5bc0a06f4879eb547f8be95543452755fc4bd84725e6637b37fd541ca21c1e
SHA5124359da53340dd931d38d268a7180f56c5ac1f88fe4e120dac7c13966a151f2d5d7331d9eeb5ee6d24bb4f3aa53f573bc3f7fe71e9eb148d8f808e0b2bb400b70
-
\ProgramData\mozglue.dllFilesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
\ProgramData\nss3.dllFilesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
\ProgramData\sqlite3.dllFilesize
1.1MB
MD51f44d4d3087c2b202cf9c90ee9d04b0f
SHA1106a3ebc9e39ab6ddb3ff987efb6527c956f192d
SHA2564841020c8bd06b08fde6e44cbe2e2ab33439e1c8368e936ec5b00dc0584f7260
SHA512b614c72a3c1ce681ebffa628e29aa50275cc80ca9267380960c5198ea4d0a3f2df6cfb7275491d220bad72f14fc94e6656501e9a061d102fb11e00cfda2beb45
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
\Users\Admin\AppData\Local\Temp\Dydhshsoe.dllFilesize
3.2MB
MD54e40b0b21e5c1f9dab372c2fc981ad5a
SHA1286cae3b928d7fad7d793038d46a14e92d592192
SHA25675442a8421770c2db6c108ed10c8a2761adc7c93d083854dfe83ccc5974aa32c
SHA512d722ecca5d572960ea7206d87f4da31be71e1b8c6388d88e2b1574388857739baedaead8d2d4dba8210b1151004196a7eea19d9084f63725b66fefee5cdfa892
-
memory/1208-744-0x0000000004220000-0x000000000456D000-memory.dmpFilesize
3.3MB
-
memory/1208-891-0x0000000004220000-0x000000000456D000-memory.dmpFilesize
3.3MB
-
memory/1208-690-0x0000000000000000-mapping.dmp
-
memory/1492-188-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/1492-184-0x0000000000000000-mapping.dmp
-
memory/1492-398-0x0000000002DA0000-0x0000000002EEA000-memory.dmpFilesize
1.3MB
-
memory/1492-399-0x0000000002FD0000-0x000000000303B000-memory.dmpFilesize
428KB
-
memory/1492-284-0x0000000000400000-0x0000000002C80000-memory.dmpFilesize
40.5MB
-
memory/1492-415-0x0000000000400000-0x0000000002C80000-memory.dmpFilesize
40.5MB
-
memory/1492-261-0x0000000002FD0000-0x000000000303B000-memory.dmpFilesize
428KB
-
memory/1492-260-0x0000000002DA0000-0x0000000002EEA000-memory.dmpFilesize
1.3MB
-
memory/1492-189-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/1492-194-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/1492-191-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/1492-192-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/1492-187-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-131-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-127-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-145-0x0000000002CE0000-0x0000000002D8E000-memory.dmpFilesize
696KB
-
memory/2016-144-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-143-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-142-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-141-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-140-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-139-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-138-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-137-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-136-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-135-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-120-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-133-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-132-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-130-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-147-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-151-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-153-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-129-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-148-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-128-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-146-0x0000000002C90000-0x0000000002C99000-memory.dmpFilesize
36KB
-
memory/2016-154-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-149-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-155-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-150-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-121-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-122-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-126-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-125-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-156-0x0000000000400000-0x0000000002C35000-memory.dmpFilesize
40.2MB
-
memory/2016-157-0x0000000000400000-0x0000000002C35000-memory.dmpFilesize
40.2MB
-
memory/2016-152-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-124-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2016-123-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/2124-982-0x0000000000000000-mapping.dmp
-
memory/2340-223-0x0000000000000000-mapping.dmp
-
memory/2340-438-0x0000000002FB3000-0x0000000002FDA000-memory.dmpFilesize
156KB
-
memory/2340-441-0x0000000002EC0000-0x0000000002F00000-memory.dmpFilesize
256KB
-
memory/2340-456-0x0000000000400000-0x0000000002C46000-memory.dmpFilesize
40.3MB
-
memory/2340-305-0x0000000002FB3000-0x0000000002FDA000-memory.dmpFilesize
156KB
-
memory/2340-307-0x0000000002EC0000-0x0000000002F00000-memory.dmpFilesize
256KB
-
memory/2340-322-0x0000000000400000-0x0000000002C46000-memory.dmpFilesize
40.3MB
-
memory/2356-489-0x0000000000000000-mapping.dmp
-
memory/2592-989-0x0000000000000000-mapping.dmp
-
memory/3408-475-0x0000000000000000-mapping.dmp
-
memory/3796-568-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/3796-792-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/3796-527-0x00000000037E0000-0x0000000003DCB000-memory.dmpFilesize
5.9MB
-
memory/3796-538-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/3796-447-0x0000000000000000-mapping.dmp
-
memory/3796-567-0x00000000037E0000-0x0000000003DCB000-memory.dmpFilesize
5.9MB
-
memory/3812-444-0x0000000000000000-mapping.dmp
-
memory/3936-1052-0x0000000000000000-mapping.dmp
-
memory/4244-352-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/4244-482-0x0000000000400000-0x0000000002C45000-memory.dmpFilesize
40.3MB
-
memory/4244-479-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/4244-262-0x0000000000000000-mapping.dmp
-
memory/4244-486-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/4244-338-0x0000000000400000-0x0000000002C45000-memory.dmpFilesize
40.3MB
-
memory/4244-324-0x0000000002CF0000-0x0000000002E3A000-memory.dmpFilesize
1.3MB
-
memory/4252-591-0x00000000035D0000-0x0000000003BC2000-memory.dmpFilesize
5.9MB
-
memory/4252-552-0x0000000000000000-mapping.dmp
-
memory/4252-705-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4252-596-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4392-898-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4392-785-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4392-761-0x0000000003690000-0x0000000003C8A000-memory.dmpFilesize
6.0MB
-
memory/4392-663-0x0000000000000000-mapping.dmp
-
memory/4428-1068-0x0000000000000000-mapping.dmp
-
memory/4532-861-0x0000000000000000-mapping.dmp
-
memory/4532-965-0x00000000037F0000-0x0000000003DE2000-memory.dmpFilesize
5.9MB
-
memory/4532-976-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4532-1074-0x00000000037F0000-0x0000000003DE2000-memory.dmpFilesize
5.9MB
-
memory/4544-346-0x0000000000000000-mapping.dmp
-
memory/4772-888-0x0000000000000000-mapping.dmp
-
memory/4772-937-0x0000000004090000-0x00000000043DD000-memory.dmpFilesize
3.3MB
-
memory/4772-1043-0x0000000004090000-0x00000000043DD000-memory.dmpFilesize
3.3MB
-
memory/4792-176-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-162-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-177-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-349-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4792-311-0x0000000003710000-0x0000000003D03000-memory.dmpFilesize
5.9MB
-
memory/4792-174-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-178-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-173-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-172-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-179-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-171-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-170-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-169-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-158-0x0000000000000000-mapping.dmp
-
memory/4792-180-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-303-0x00000000055B0000-0x0000000005BD0000-memory.dmpFilesize
6.1MB
-
memory/4792-182-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-183-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-168-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-211-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4792-181-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-166-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-185-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-165-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-190-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-164-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-163-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-193-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-610-0x0000000000400000-0x000000000320A000-memory.dmpFilesize
46.0MB
-
memory/4792-160-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4792-201-0x0000000003710000-0x0000000003D03000-memory.dmpFilesize
5.9MB
-
memory/4792-205-0x00000000055B0000-0x0000000005BD0000-memory.dmpFilesize
6.1MB
-
memory/4792-161-0x0000000076FB0000-0x000000007713E000-memory.dmpFilesize
1.6MB
-
memory/4908-949-0x0000000000400000-0x000000000074D000-memory.dmpFilesize
3.3MB
-
memory/4908-834-0x0000000000400000-0x000000000074D000-memory.dmpFilesize
3.3MB
-
memory/4908-779-0x0000000000000000-mapping.dmp
-
memory/4956-748-0x0000000000400000-0x000000000074D000-memory.dmpFilesize
3.3MB
-
memory/4956-651-0x0000000000400000-0x000000000074D000-memory.dmpFilesize
3.3MB
-
memory/4956-597-0x0000000000000000-mapping.dmp