Analysis

  • max time kernel
    56s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07-11-2022 16:16

General

  • Target

    319e5fbf83add883095fef277ac8e092.exe

  • Size

    2.3MB

  • MD5

    319e5fbf83add883095fef277ac8e092

  • SHA1

    8ae961c6b93f01bb6d7927223041f2d18ed3a2f9

  • SHA256

    b295631063a6186a09a9dfee224bca7af6d4ab1650e9d63cdc325cf3fe1cd3d6

  • SHA512

    1acf3b45fea1141338539cd7d37ff77d56911a27446fc4e83abaea4da904208e644c3bfdb15b78e868472c88ddd6d684ad162c268c1b2c2dea50b3e810c19d11

  • SSDEEP

    49152:D0h8WyLIxcxU0oQGqmIHyPFUI/G7y3NmbzoZAXCRWlR1ObMy5TKiM:D0htUIOxUXlIHuaf7y3gz1KbM

Malware Config

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\319e5fbf83add883095fef277ac8e092.exe
    "C:\Users\Admin\AppData\Local\Temp\319e5fbf83add883095fef277ac8e092.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    PID:1208
    • C:\Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe
      "C:\Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe"
      2⤵
        PID:1168
        • C:\Users\Admin\AppData\Local\Temp\is-RUBDI.tmp\is-9GDMO.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-RUBDI.tmp\is-9GDMO.tmp" /SL4 $20156 "C:\Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe" 2610866 52736
          3⤵
            PID:980
            • C:\Program Files (x86)\fvSearcher\fvsearcher72.exe
              "C:\Program Files (x86)\fvSearcher\fvsearcher72.exe"
              4⤵
                PID:32956
          • C:\Users\Admin\Pictures\Minor Policy\da9MQhmxZIiMf6n7CW53fE4V.exe
            "C:\Users\Admin\Pictures\Minor Policy\da9MQhmxZIiMf6n7CW53fE4V.exe"
            2⤵
              PID:1764
              • C:\Windows\SysWOW64\regsvr32.exe
                "C:\Windows\System32\regsvr32.exe" /u .\CR9K0Y.TFe /s
                3⤵
                  PID:34488
              • C:\Users\Admin\Pictures\Minor Policy\2DNT432pEKhPlNAZr8YBh11q.exe
                "C:\Users\Admin\Pictures\Minor Policy\2DNT432pEKhPlNAZr8YBh11q.exe"
                2⤵
                  PID:1904
                • C:\Users\Admin\Pictures\Minor Policy\c6wAxAgct1Ca7K4P6PW3k26U.exe
                  "C:\Users\Admin\Pictures\Minor Policy\c6wAxAgct1Ca7K4P6PW3k26U.exe"
                  2⤵
                    PID:788
                  • C:\Users\Admin\Pictures\Minor Policy\WNleY0r5Q_U_B560cG_z6dVO.exe
                    "C:\Users\Admin\Pictures\Minor Policy\WNleY0r5Q_U_B560cG_z6dVO.exe"
                    2⤵
                      PID:672
                    • C:\Users\Admin\Pictures\Minor Policy\sNGYcaIOJrB1A0wji_hXocqc.exe
                      "C:\Users\Admin\Pictures\Minor Policy\sNGYcaIOJrB1A0wji_hXocqc.exe"
                      2⤵
                        PID:1976
                      • C:\Users\Admin\Pictures\Minor Policy\780cmfeGUUyr2FCfp_9_ynI7.exe
                        "C:\Users\Admin\Pictures\Minor Policy\780cmfeGUUyr2FCfp_9_ynI7.exe"
                        2⤵
                          PID:28456
                        • C:\Users\Admin\Pictures\Minor Policy\c3jPagYQLLfuNTS9r21vSdzm.exe
                          "C:\Users\Admin\Pictures\Minor Policy\c3jPagYQLLfuNTS9r21vSdzm.exe"
                          2⤵
                            PID:34456
                          • C:\Users\Admin\Pictures\Minor Policy\V2WQ6ff63Njo0O87khA90ynb.exe
                            "C:\Users\Admin\Pictures\Minor Policy\V2WQ6ff63Njo0O87khA90ynb.exe"
                            2⤵
                              PID:35340
                            • C:\Users\Admin\Pictures\Minor Policy\hxq4YwzE8vHMs51ubi_PR1wg.exe
                              "C:\Users\Admin\Pictures\Minor Policy\hxq4YwzE8vHMs51ubi_PR1wg.exe"
                              2⤵
                                PID:35048
                              • C:\Users\Admin\Pictures\Minor Policy\NdJpcknvp3wDkGkFg0G0SLVz.exe
                                "C:\Users\Admin\Pictures\Minor Policy\NdJpcknvp3wDkGkFg0G0SLVz.exe"
                                2⤵
                                  PID:34644

                              Network

                              MITRE ATT&CK Matrix ATT&CK v6

                              Defense Evasion

                              Install Root Certificate

                              1
                              T1130

                              Modify Registry

                              1
                              T1112

                              Credential Access

                              Credentials in Files

                              1
                              T1081

                              Discovery

                              Query Registry

                              1
                              T1012

                              System Information Discovery

                              2
                              T1082

                              Collection

                              Data from Local System

                              1
                              T1005

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Program Files (x86)\fvSearcher\fvsearcher72.exe
                                Filesize

                                4.1MB

                                MD5

                                7ed831c6f1855a6bf01a40b6a7832692

                                SHA1

                                7fc25d613ed978e5a15fce49cad32c4d04b143f6

                                SHA256

                                292220287e4237296909e39bc09704ad27e1528598af1825a8a7939ca6489c82

                                SHA512

                                7569edbd88f06ba5d4457d412add284df142b6b9261de6428168ad43f422d9419490c0dfc46e769ae1f25bc8502e1572a2006774e33a38a5b94afa7b578ae48d

                              • C:\Users\Admin\AppData\Local\Temp\is-RUBDI.tmp\is-9GDMO.tmp
                                Filesize

                                657KB

                                MD5

                                7cd12c54a9751ca6eee6ab0c85fb68f5

                                SHA1

                                76562e9b7888b6d20d67addb5a90b68b54a51987

                                SHA256

                                e82cabb027db8846c3430be760f137afa164c36f9e1b93a6e34c96de0b2c5a5f

                                SHA512

                                27ba5d2f719aaac2ead6fb42f23af3aa866f75026be897cd2f561f3e383904e89e6043bd22b4ae24f69787bd258a68ff696c09c03d656cbf7c79c2a52d8d82cc

                              • C:\Users\Admin\AppData\Local\Temp\is-RUBDI.tmp\is-9GDMO.tmp
                                Filesize

                                657KB

                                MD5

                                7cd12c54a9751ca6eee6ab0c85fb68f5

                                SHA1

                                76562e9b7888b6d20d67addb5a90b68b54a51987

                                SHA256

                                e82cabb027db8846c3430be760f137afa164c36f9e1b93a6e34c96de0b2c5a5f

                                SHA512

                                27ba5d2f719aaac2ead6fb42f23af3aa866f75026be897cd2f561f3e383904e89e6043bd22b4ae24f69787bd258a68ff696c09c03d656cbf7c79c2a52d8d82cc

                              • C:\Users\Admin\Pictures\Minor Policy\2DNT432pEKhPlNAZr8YBh11q.exe
                                Filesize

                                304KB

                                MD5

                                b59813ba5de5a7dcc3eb5e91ca4fda89

                                SHA1

                                75649583ff5a37f2ba5a3d76a5b326179a3e26cf

                                SHA256

                                1076810cc7354b973a944afe53f060516f80be75e2ea3fe4959cb4181a774f2f

                                SHA512

                                13272547a6c56f876d518671f9e727aa3cb6fd32b5c45b8658da5991fe3db5ba0292c1b129870e43c18e4c69946b4915786c66e182ae0cb7283b586c260282a6

                              • C:\Users\Admin\Pictures\Minor Policy\780cmfeGUUyr2FCfp_9_ynI7.exe
                                Filesize

                                327KB

                                MD5

                                583f633192f85aaa50b9f7ed7b169b39

                                SHA1

                                a4cc6354ae632607535728b00d47359641fa445c

                                SHA256

                                02384bb954f75596ee2caa74b7a9b2be6d4c39ae191d864b50725bc8f5245a41

                                SHA512

                                309d81e72fbc8855fb6c90fdc2ce2cfb28d191e6300a8c2a98130eae8619da21eccd51dc40b33572af476beae835a9feb39de6a6e643283933ce7cb97e08e2b4

                              • C:\Users\Admin\Pictures\Minor Policy\WNleY0r5Q_U_B560cG_z6dVO.exe
                                Filesize

                                347KB

                                MD5

                                8f3edcc5fc17f9b91c68301a6a5eea59

                                SHA1

                                395b1ee0065a0fb9a8e7d5f5eb0602f95349dd0b

                                SHA256

                                97ab011fe58e16d30e5c7cc80f3a4adee69950377687335fd30d1790e77059ec

                                SHA512

                                79ac8e84f50e6e359c4c152d81df1baed081a9576acddb2acea51218947569ac094448b31c2784e257a85dced74472c8da443514374dfbd43971f5cef6a35baf

                              • C:\Users\Admin\Pictures\Minor Policy\c6wAxAgct1Ca7K4P6PW3k26U.exe
                                Filesize

                                447KB

                                MD5

                                8b88b2436809e4e15539e77c90a49762

                                SHA1

                                6808b8cae07c31bbc886b92e81b7f93fd24e7fb7

                                SHA256

                                72a38b7b1c14bb89928a4fcac764d081d0b9df697d101045140aa81be828a385

                                SHA512

                                3b90084ec21ff21ece27d69d892dc75d1390ca88fe205e16ddfcef8976aee208e583871e1ab1034b984bf04b68e6fac3bc221783e2253e667ec40cd9430ed2d0

                              • C:\Users\Admin\Pictures\Minor Policy\da9MQhmxZIiMf6n7CW53fE4V.exe
                                Filesize

                                1.9MB

                                MD5

                                99d190f3cf04074b15d9fce1b561e409

                                SHA1

                                1dd8b0f3e8153a6444149a54115a8fac6fa8d22b

                                SHA256

                                6f932692eb39b75cd8922a2b58b8268971872ec6f481709e721b6d981191891c

                                SHA512

                                f0fc9d97d080054ac8321e6dc2468e997e5de2ef748f090a97d859538f6f63215386100a72a928f117ad567be0c9f9eef188adcbd6eabf182108cc09891551ad

                              • C:\Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe
                                Filesize

                                2.7MB

                                MD5

                                ed6f108507e46f904fa2cf658090ab92

                                SHA1

                                5d38bb28dcf27180ed6e163c1829fa9e7203792c

                                SHA256

                                02b0620be7054935065ab4021baca9455abbc888d705e7f3eed7094e442eaca1

                                SHA512

                                110c2abc16dc0f008be3f2608a1a17a43c335c12fa78357f7879027069a2ac1487f17567017a788fdacddc9074882a1c3802160ede9db7b4e8af4de323a268ce

                              • C:\Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe
                                Filesize

                                2.7MB

                                MD5

                                ed6f108507e46f904fa2cf658090ab92

                                SHA1

                                5d38bb28dcf27180ed6e163c1829fa9e7203792c

                                SHA256

                                02b0620be7054935065ab4021baca9455abbc888d705e7f3eed7094e442eaca1

                                SHA512

                                110c2abc16dc0f008be3f2608a1a17a43c335c12fa78357f7879027069a2ac1487f17567017a788fdacddc9074882a1c3802160ede9db7b4e8af4de323a268ce

                              • C:\Users\Admin\Pictures\Minor Policy\sNGYcaIOJrB1A0wji_hXocqc.exe
                                Filesize

                                4.8MB

                                MD5

                                854d5dfe2d5193aa4150765c123df8ad

                                SHA1

                                1b21d80c4beb90b03d795cf11145619aeb3a4f37

                                SHA256

                                85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45

                                SHA512

                                48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc

                              • \Program Files (x86)\fvSearcher\fvsearcher72.exe
                                Filesize

                                4.1MB

                                MD5

                                7ed831c6f1855a6bf01a40b6a7832692

                                SHA1

                                7fc25d613ed978e5a15fce49cad32c4d04b143f6

                                SHA256

                                292220287e4237296909e39bc09704ad27e1528598af1825a8a7939ca6489c82

                                SHA512

                                7569edbd88f06ba5d4457d412add284df142b6b9261de6428168ad43f422d9419490c0dfc46e769ae1f25bc8502e1572a2006774e33a38a5b94afa7b578ae48d

                              • \Users\Admin\AppData\Local\Temp\is-IKEKL.tmp\_isetup\_iscrypt.dll
                                Filesize

                                2KB

                                MD5

                                a69559718ab506675e907fe49deb71e9

                                SHA1

                                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                SHA256

                                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                SHA512

                                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                              • \Users\Admin\AppData\Local\Temp\is-IKEKL.tmp\_isetup\_shfoldr.dll
                                Filesize

                                22KB

                                MD5

                                92dc6ef532fbb4a5c3201469a5b5eb63

                                SHA1

                                3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                SHA256

                                9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                SHA512

                                9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                              • \Users\Admin\AppData\Local\Temp\is-IKEKL.tmp\_isetup\_shfoldr.dll
                                Filesize

                                22KB

                                MD5

                                92dc6ef532fbb4a5c3201469a5b5eb63

                                SHA1

                                3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                SHA256

                                9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                SHA512

                                9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                              • \Users\Admin\AppData\Local\Temp\is-RUBDI.tmp\is-9GDMO.tmp
                                Filesize

                                657KB

                                MD5

                                7cd12c54a9751ca6eee6ab0c85fb68f5

                                SHA1

                                76562e9b7888b6d20d67addb5a90b68b54a51987

                                SHA256

                                e82cabb027db8846c3430be760f137afa164c36f9e1b93a6e34c96de0b2c5a5f

                                SHA512

                                27ba5d2f719aaac2ead6fb42f23af3aa866f75026be897cd2f561f3e383904e89e6043bd22b4ae24f69787bd258a68ff696c09c03d656cbf7c79c2a52d8d82cc

                              • \Users\Admin\Pictures\Minor Policy\2DNT432pEKhPlNAZr8YBh11q.exe
                                Filesize

                                304KB

                                MD5

                                b59813ba5de5a7dcc3eb5e91ca4fda89

                                SHA1

                                75649583ff5a37f2ba5a3d76a5b326179a3e26cf

                                SHA256

                                1076810cc7354b973a944afe53f060516f80be75e2ea3fe4959cb4181a774f2f

                                SHA512

                                13272547a6c56f876d518671f9e727aa3cb6fd32b5c45b8658da5991fe3db5ba0292c1b129870e43c18e4c69946b4915786c66e182ae0cb7283b586c260282a6

                              • \Users\Admin\Pictures\Minor Policy\2DNT432pEKhPlNAZr8YBh11q.exe
                                Filesize

                                304KB

                                MD5

                                b59813ba5de5a7dcc3eb5e91ca4fda89

                                SHA1

                                75649583ff5a37f2ba5a3d76a5b326179a3e26cf

                                SHA256

                                1076810cc7354b973a944afe53f060516f80be75e2ea3fe4959cb4181a774f2f

                                SHA512

                                13272547a6c56f876d518671f9e727aa3cb6fd32b5c45b8658da5991fe3db5ba0292c1b129870e43c18e4c69946b4915786c66e182ae0cb7283b586c260282a6

                              • \Users\Admin\Pictures\Minor Policy\780cmfeGUUyr2FCfp_9_ynI7.exe
                                Filesize

                                327KB

                                MD5

                                583f633192f85aaa50b9f7ed7b169b39

                                SHA1

                                a4cc6354ae632607535728b00d47359641fa445c

                                SHA256

                                02384bb954f75596ee2caa74b7a9b2be6d4c39ae191d864b50725bc8f5245a41

                                SHA512

                                309d81e72fbc8855fb6c90fdc2ce2cfb28d191e6300a8c2a98130eae8619da21eccd51dc40b33572af476beae835a9feb39de6a6e643283933ce7cb97e08e2b4

                              • \Users\Admin\Pictures\Minor Policy\780cmfeGUUyr2FCfp_9_ynI7.exe
                                Filesize

                                327KB

                                MD5

                                583f633192f85aaa50b9f7ed7b169b39

                                SHA1

                                a4cc6354ae632607535728b00d47359641fa445c

                                SHA256

                                02384bb954f75596ee2caa74b7a9b2be6d4c39ae191d864b50725bc8f5245a41

                                SHA512

                                309d81e72fbc8855fb6c90fdc2ce2cfb28d191e6300a8c2a98130eae8619da21eccd51dc40b33572af476beae835a9feb39de6a6e643283933ce7cb97e08e2b4

                              • \Users\Admin\Pictures\Minor Policy\WNleY0r5Q_U_B560cG_z6dVO.exe
                                Filesize

                                347KB

                                MD5

                                8f3edcc5fc17f9b91c68301a6a5eea59

                                SHA1

                                395b1ee0065a0fb9a8e7d5f5eb0602f95349dd0b

                                SHA256

                                97ab011fe58e16d30e5c7cc80f3a4adee69950377687335fd30d1790e77059ec

                                SHA512

                                79ac8e84f50e6e359c4c152d81df1baed081a9576acddb2acea51218947569ac094448b31c2784e257a85dced74472c8da443514374dfbd43971f5cef6a35baf

                              • \Users\Admin\Pictures\Minor Policy\WNleY0r5Q_U_B560cG_z6dVO.exe
                                Filesize

                                347KB

                                MD5

                                8f3edcc5fc17f9b91c68301a6a5eea59

                                SHA1

                                395b1ee0065a0fb9a8e7d5f5eb0602f95349dd0b

                                SHA256

                                97ab011fe58e16d30e5c7cc80f3a4adee69950377687335fd30d1790e77059ec

                                SHA512

                                79ac8e84f50e6e359c4c152d81df1baed081a9576acddb2acea51218947569ac094448b31c2784e257a85dced74472c8da443514374dfbd43971f5cef6a35baf

                              • \Users\Admin\Pictures\Minor Policy\da9MQhmxZIiMf6n7CW53fE4V.exe
                                Filesize

                                1.9MB

                                MD5

                                99d190f3cf04074b15d9fce1b561e409

                                SHA1

                                1dd8b0f3e8153a6444149a54115a8fac6fa8d22b

                                SHA256

                                6f932692eb39b75cd8922a2b58b8268971872ec6f481709e721b6d981191891c

                                SHA512

                                f0fc9d97d080054ac8321e6dc2468e997e5de2ef748f090a97d859538f6f63215386100a72a928f117ad567be0c9f9eef188adcbd6eabf182108cc09891551ad

                              • \Users\Admin\Pictures\Minor Policy\s4P_5ryWUjnP5REIKJqxUxKn.exe
                                Filesize

                                2.7MB

                                MD5

                                ed6f108507e46f904fa2cf658090ab92

                                SHA1

                                5d38bb28dcf27180ed6e163c1829fa9e7203792c

                                SHA256

                                02b0620be7054935065ab4021baca9455abbc888d705e7f3eed7094e442eaca1

                                SHA512

                                110c2abc16dc0f008be3f2608a1a17a43c335c12fa78357f7879027069a2ac1487f17567017a788fdacddc9074882a1c3802160ede9db7b4e8af4de323a268ce

                              • \Users\Admin\Pictures\Minor Policy\sNGYcaIOJrB1A0wji_hXocqc.exe
                                Filesize

                                4.8MB

                                MD5

                                854d5dfe2d5193aa4150765c123df8ad

                                SHA1

                                1b21d80c4beb90b03d795cf11145619aeb3a4f37

                                SHA256

                                85b73b7b3c9acc6648beb77ce878ebeea26a2a949bf17c3184f2bd4544d12b45

                                SHA512

                                48ed604ea966a35cc16631ce5da692bb236badafdb6d3d01ef3a27ab5a9c1ea6a19d6e8209c894ab292614cfbd355c2ca96401fd4dbb9a3abbfd886cddae77cc

                              • memory/672-68-0x0000000000000000-mapping.dmp
                              • memory/980-84-0x0000000000000000-mapping.dmp
                              • memory/1168-56-0x0000000000000000-mapping.dmp
                              • memory/1168-78-0x0000000000400000-0x0000000000414000-memory.dmp
                                Filesize

                                80KB

                              • memory/1208-54-0x0000000075D01000-0x0000000075D03000-memory.dmp
                                Filesize

                                8KB

                              • memory/1208-75-0x0000000005C30000-0x00000000064DD000-memory.dmp
                                Filesize

                                8.7MB

                              • memory/1208-77-0x0000000004530000-0x00000000047A8000-memory.dmp
                                Filesize

                                2.5MB

                              • memory/1764-58-0x0000000000000000-mapping.dmp
                              • memory/1904-65-0x0000000000000000-mapping.dmp
                              • memory/1904-107-0x00000000022B0000-0x00000000022FA000-memory.dmp
                                Filesize

                                296KB

                              • memory/1976-81-0x0000000000400000-0x0000000000CAD000-memory.dmp
                                Filesize

                                8.7MB

                              • memory/1976-76-0x0000000000400000-0x0000000000CAD000-memory.dmp
                                Filesize

                                8.7MB

                              • memory/1976-60-0x0000000000000000-mapping.dmp
                              • memory/1976-92-0x0000000000400000-0x0000000000CAD000-memory.dmp
                                Filesize

                                8.7MB

                              • memory/28456-95-0x0000000000000000-mapping.dmp
                              • memory/32956-98-0x0000000000000000-mapping.dmp
                              • memory/34488-105-0x0000000000000000-mapping.dmp