Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2022 19:49
Static task
static1
Behavioral task
behavioral1
Sample
0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe
Resource
win10v2004-20220812-en
General
-
Target
0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe
-
Size
188KB
-
MD5
356f0831694fb49e590da55f15f78c4a
-
SHA1
94e02786e55686b320a864d8e653f9f6a6778f95
-
SHA256
0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8
-
SHA512
21a815fe0b01fe6b0b53ca0889eb961e5a6497c870ccc849f1e6ceb63b699f709896f230f08756861c8cde1cc746d6a79a5c15ce9dfb3462d94c35e08a929f40
-
SSDEEP
3072:TkXFAflwTuLMovgkA7RbcuwBmOhBxuRMXlwntdn3+VHsvnc:MFUpLMovgk9bmOu+in73+VHsvc
Malware Config
Extracted
raccoon
53508e7dc4e08bd33122d190a04a1200
http://45.15.156.105/
Extracted
redline
Google2
167.235.71.14:20469
-
auth_value
fb274d9691235ba015830da570a13578
Extracted
redline
mao
77.73.134.251:4691
-
auth_value
a06897b11f5e600c4479f1b544acc337
Signatures
-
Detect Amadey credential stealer module 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll amadey_cred_module -
Detects Smokeloader packer 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4912-133-0x00000000022C0000-0x00000000022C9000-memory.dmp family_smokeloader -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4648-229-0x0000000000400000-0x0000000000428000-memory.dmp family_redline behavioral1/memory/4640-227-0x0000000000A20000-0x0000000000A48000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exe family_redline behavioral1/memory/372-239-0x00000000003E0000-0x0000000000455000-memory.dmp family_redline -
SmokeLoader
Modular backdoor trojan in use since 2014.
-
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 81 2188 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 15 IoCs
Processes:
jiburdbD179.exeE31D.exeE503.exeEBE9.exeEF75.exeF3EA.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeF7E3.exerovwer.exerovwer.exe1271.exemao.exeLYKAA.exerovwer.exepid process 4320 jiburdb 3468 D179.exe 1456 E31D.exe 3480 E503.exe 3780 EBE9.exe 816 EF75.exe 1608 F3EA.exe 3592 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe 372 F7E3.exe 3076 rovwer.exe 5068 rovwer.exe 3744 1271.exe 4640 mao.exe 1560 LYKAA.exe 2232 rovwer.exe -
Processes:
resource yara_rule behavioral1/memory/3980-180-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/3980-184-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/3980-188-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/3980-192-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/3980-199-0x0000000000400000-0x0000000000BEB000-memory.dmp upx behavioral1/memory/3980-202-0x0000000000400000-0x0000000000BEB000-memory.dmp upx -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
EF75.exeEBE9.exeE31D.exerovwer.exeLYKAA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation EF75.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation EBE9.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation E31D.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation rovwer.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation LYKAA.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2188 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mao.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000070001\\mao.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 62 ip-api.com -
Suspicious use of SetThreadContext 4 IoCs
Processes:
E503.exeF3EA.exeF7E3.exe1271.exedescription pid process target process PID 3480 set thread context of 1648 3480 E503.exe AppLaunch.exe PID 1608 set thread context of 3980 1608 F3EA.exe RegSvcs.exe PID 372 set thread context of 4648 372 F7E3.exe vbc.exe PID 3744 set thread context of 2552 3744 1271.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4820 3480 WerFault.exe E503.exe 840 3780 WerFault.exe EBE9.exe 2440 1456 WerFault.exe E31D.exe 4556 5068 WerFault.exe rovwer.exe 4288 372 WerFault.exe F7E3.exe 2832 2232 WerFault.exe rovwer.exe 4100 3468 WerFault.exe D179.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
jiburdb0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exedescription ioc process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jiburdb Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jiburdb Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI jiburdb -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4600 schtasks.exe 1912 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4636 timeout.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
Processes:
description flow ioc HTTP User-Agent header 53 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exepid process 4912 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe 4912 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2520 -
Suspicious behavior: MapViewOfSection 20 IoCs
Processes:
0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exejiburdbpid process 4912 0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe 4320 jiburdb 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 2520 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeD179.exeAppLaunch.exeLYKAA.exemao.exevbc.exedescription pid process Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 3592 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe Token: SeDebugPrivilege 3468 D179.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 2552 AppLaunch.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 1560 LYKAA.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeDebugPrivilege 4640 mao.exe Token: SeDebugPrivilege 4648 vbc.exe Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 Token: SeShutdownPrivilege 2520 Token: SeCreatePagefilePrivilege 2520 -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
E503.exeEF75.exeF3EA.exeEBE9.exeE31D.exeEAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exerovwer.execmd.exe1271.exeF7E3.exedescription pid process target process PID 2520 wrote to memory of 3468 2520 D179.exe PID 2520 wrote to memory of 3468 2520 D179.exe PID 2520 wrote to memory of 3468 2520 D179.exe PID 2520 wrote to memory of 1456 2520 E31D.exe PID 2520 wrote to memory of 1456 2520 E31D.exe PID 2520 wrote to memory of 1456 2520 E31D.exe PID 2520 wrote to memory of 3480 2520 E503.exe PID 2520 wrote to memory of 3480 2520 E503.exe PID 2520 wrote to memory of 3480 2520 E503.exe PID 3480 wrote to memory of 1648 3480 E503.exe AppLaunch.exe PID 3480 wrote to memory of 1648 3480 E503.exe AppLaunch.exe PID 3480 wrote to memory of 1648 3480 E503.exe AppLaunch.exe PID 3480 wrote to memory of 1648 3480 E503.exe AppLaunch.exe PID 3480 wrote to memory of 1648 3480 E503.exe AppLaunch.exe PID 2520 wrote to memory of 3780 2520 EBE9.exe PID 2520 wrote to memory of 3780 2520 EBE9.exe PID 2520 wrote to memory of 3780 2520 EBE9.exe PID 2520 wrote to memory of 816 2520 EF75.exe PID 2520 wrote to memory of 816 2520 EF75.exe PID 2520 wrote to memory of 1608 2520 F3EA.exe PID 2520 wrote to memory of 1608 2520 F3EA.exe PID 816 wrote to memory of 3592 816 EF75.exe EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe PID 816 wrote to memory of 3592 816 EF75.exe EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 1608 wrote to memory of 3980 1608 F3EA.exe RegSvcs.exe PID 2520 wrote to memory of 372 2520 F7E3.exe PID 2520 wrote to memory of 372 2520 F7E3.exe PID 2520 wrote to memory of 372 2520 F7E3.exe PID 3780 wrote to memory of 3076 3780 EBE9.exe rovwer.exe PID 3780 wrote to memory of 3076 3780 EBE9.exe rovwer.exe PID 3780 wrote to memory of 3076 3780 EBE9.exe rovwer.exe PID 1456 wrote to memory of 5068 1456 E31D.exe rovwer.exe PID 1456 wrote to memory of 5068 1456 E31D.exe rovwer.exe PID 1456 wrote to memory of 5068 1456 E31D.exe rovwer.exe PID 3592 wrote to memory of 2720 3592 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe cmd.exe PID 3592 wrote to memory of 2720 3592 EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe cmd.exe PID 2520 wrote to memory of 3744 2520 1271.exe PID 2520 wrote to memory of 3744 2520 1271.exe PID 2520 wrote to memory of 3744 2520 1271.exe PID 3076 wrote to memory of 4600 3076 rovwer.exe schtasks.exe PID 3076 wrote to memory of 4600 3076 rovwer.exe schtasks.exe PID 3076 wrote to memory of 4600 3076 rovwer.exe schtasks.exe PID 2520 wrote to memory of 1292 2520 explorer.exe PID 2520 wrote to memory of 1292 2520 explorer.exe PID 2520 wrote to memory of 1292 2520 explorer.exe PID 2520 wrote to memory of 1292 2520 explorer.exe PID 2720 wrote to memory of 4636 2720 cmd.exe timeout.exe PID 2720 wrote to memory of 4636 2720 cmd.exe timeout.exe PID 3744 wrote to memory of 2552 3744 1271.exe AppLaunch.exe PID 3744 wrote to memory of 2552 3744 1271.exe AppLaunch.exe PID 3744 wrote to memory of 2552 3744 1271.exe AppLaunch.exe PID 3076 wrote to memory of 4640 3076 rovwer.exe mao.exe PID 3076 wrote to memory of 4640 3076 rovwer.exe mao.exe PID 3076 wrote to memory of 4640 3076 rovwer.exe mao.exe PID 372 wrote to memory of 4648 372 F7E3.exe vbc.exe PID 372 wrote to memory of 4648 372 F7E3.exe vbc.exe PID 372 wrote to memory of 4648 372 F7E3.exe vbc.exe PID 372 wrote to memory of 4648 372 F7E3.exe vbc.exe PID 3744 wrote to memory of 2552 3744 1271.exe AppLaunch.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe"C:\Users\Admin\AppData\Local\Temp\0ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Roaming\jiburdbC:\Users\Admin\AppData\Roaming\jiburdb1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious behavior: MapViewOfSection
-
C:\Users\Admin\AppData\Local\Temp\D179.exeC:\Users\Admin\AppData\Local\Temp\D179.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 17362⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\E31D.exeC:\Users\Admin\AppData\Local\Temp\E31D.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 4203⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 11482⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\E503.exeC:\Users\Admin\AppData\Local\Temp\E503.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 2642⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3480 -ip 34801⤵
-
C:\Users\Admin\AppData\Local\Temp\EBE9.exeC:\Users\Admin\AppData\Local\Temp\EBE9.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe" /F3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exe"C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- outlook_win_path
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 12722⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\EF75.exeC:\Users\Admin\AppData\Local\Temp\EF75.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp22E.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"5⤵
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "LYKAA" /tr "C:\ProgramData\GhubSoftWalletTrust\LYKAA.exe"6⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\F3EA.exeC:\Users\Admin\AppData\Local\Temp\F3EA.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\F7E3.exeC:\Users\Admin\AppData\Local\Temp\F7E3.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 372 -s 2962⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1456 -ip 14561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3780 -ip 37801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 5068 -ip 50681⤵
-
C:\Users\Admin\AppData\Local\Temp\1271.exeC:\Users\Admin\AppData\Local\Temp\1271.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 372 -ip 3721⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Windows\explorer.exeC:\Windows\explorer.exe1⤵
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeC:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 4282⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2232 -ip 22321⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3468 -ip 34681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\ProgramData\GhubSoftWalletTrust\LYKAA.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exeFilesize
137KB
MD5bcd28aedd4ce2e304e7edd98ca3cfcb2
SHA1baed657cbf38cf9debf923e7036acdcf99165bc0
SHA256dc9d09314c0e04aca5ee0b5ff4e0e654961a7a9c42ebe98b146fcc0dbcac1785
SHA512c15cd5d7105f506aa342b4178392da5f666c5ec0cc1e6145650dcc51ce0e67654d3e54a6e79d33220678fd557ab8070b84e8e1e312afebc1c7395eab2bf62064
-
C:\Users\Admin\AppData\Local\Temp\1000070001\mao.exeFilesize
137KB
MD5bcd28aedd4ce2e304e7edd98ca3cfcb2
SHA1baed657cbf38cf9debf923e7036acdcf99165bc0
SHA256dc9d09314c0e04aca5ee0b5ff4e0e654961a7a9c42ebe98b146fcc0dbcac1785
SHA512c15cd5d7105f506aa342b4178392da5f666c5ec0cc1e6145650dcc51ce0e67654d3e54a6e79d33220678fd557ab8070b84e8e1e312afebc1c7395eab2bf62064
-
C:\Users\Admin\AppData\Local\Temp\1271.exeFilesize
3.3MB
MD556b8129cba9ab9f857ebc8d424ec3f6e
SHA153d9422d84a2861361a7d5c7741f917ea8db4d7e
SHA25637ad2f39fa9664ca333e2c84b20e74cf9d01997f88e3946572b68971538290cd
SHA5122af9aead0530bd2eb415e50c5784c322819d7e1a54e021b28bf26144b0df2d36726bb1ecb12040417d2d601c2db54bfd2b73bc19f7e320f2068795f2ae6f906a
-
C:\Users\Admin\AppData\Local\Temp\1271.exeFilesize
3.3MB
MD556b8129cba9ab9f857ebc8d424ec3f6e
SHA153d9422d84a2861361a7d5c7741f917ea8db4d7e
SHA25637ad2f39fa9664ca333e2c84b20e74cf9d01997f88e3946572b68971538290cd
SHA5122af9aead0530bd2eb415e50c5784c322819d7e1a54e021b28bf26144b0df2d36726bb1ecb12040417d2d601c2db54bfd2b73bc19f7e320f2068795f2ae6f906a
-
C:\Users\Admin\AppData\Local\Temp\D179.exeFilesize
339KB
MD52e13eb39c176ac29f7794d9770e3c1f4
SHA1f4b098f12e41560242e6f5d9975b9c6187d26866
SHA2565b6429f38ac48a93050ffdaea60282c3b30f278534200ada99363398102cbe55
SHA51221817d4f56e58a593c110e00958fbb9899a1c643c0864e726c462c694c000f4152cdb501bcdddb70a17b0fd72a1d8f46537e20a71e907b8db67dffd04492202d
-
C:\Users\Admin\AppData\Local\Temp\D179.exeFilesize
339KB
MD52e13eb39c176ac29f7794d9770e3c1f4
SHA1f4b098f12e41560242e6f5d9975b9c6187d26866
SHA2565b6429f38ac48a93050ffdaea60282c3b30f278534200ada99363398102cbe55
SHA51221817d4f56e58a593c110e00958fbb9899a1c643c0864e726c462c694c000f4152cdb501bcdddb70a17b0fd72a1d8f46537e20a71e907b8db67dffd04492202d
-
C:\Users\Admin\AppData\Local\Temp\E31D.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\E31D.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\E503.exeFilesize
275KB
MD5ab45b17d29efac4957075c72519d2243
SHA1d6b044ab1f103424f190ed3fb33944609b21db3e
SHA25602577523a1d0dc64387458f4257473a08dc152fe6070fa06febd645ed6d515ad
SHA51272a28a26d2dffe56cfc330a9d7d6b3e8674e453d3a1ffedc982f276ae853d296b424e25031c4befb292449a4e30c28ed79956a227f71da5a4c2caf70f81802e2
-
C:\Users\Admin\AppData\Local\Temp\E503.exeFilesize
275KB
MD5ab45b17d29efac4957075c72519d2243
SHA1d6b044ab1f103424f190ed3fb33944609b21db3e
SHA25602577523a1d0dc64387458f4257473a08dc152fe6070fa06febd645ed6d515ad
SHA51272a28a26d2dffe56cfc330a9d7d6b3e8674e453d3a1ffedc982f276ae853d296b424e25031c4befb292449a4e30c28ed79956a227f71da5a4c2caf70f81802e2
-
C:\Users\Admin\AppData\Local\Temp\EBE9.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\EBE9.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\EF75.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\EF75.exeFilesize
1.1MB
MD5ae30203171ea1b8be4017efcab8dd23e
SHA1597c1cbc27659181318bd9d4f44fcd55abc4e36e
SHA256a232ab45ccd355e5ba96a254edcc53deb2bcbf154610732b444cb5d6d07ce401
SHA512b1a963f6b0953673145191540e22d9eee4039efccbb8bf153517ba63257a056000a15fd52edf4c6a2dd572cca5267d675a174694c694e408d9a006e4dc933f04
-
C:\Users\Admin\AppData\Local\Temp\F3EA.exeFilesize
3.0MB
MD539dea452043651bbb94be8f3b009d6b5
SHA1cad231a8730d3d09fdc34e212a6ed8e839b1cb90
SHA256c1b946de49fe49cfd1c4033bf0d88b0724b93b73d83ed1ec208442359860055f
SHA5120a029b8075cb5bfef0f499b2c807772b5be76db3e8a49cd7ffb5c890db7888c09c6aafe509c98e977d9df40a7e4e93e83c095e37cd3758ebd8d5cd2045ec0498
-
C:\Users\Admin\AppData\Local\Temp\F3EA.exeFilesize
3.0MB
MD539dea452043651bbb94be8f3b009d6b5
SHA1cad231a8730d3d09fdc34e212a6ed8e839b1cb90
SHA256c1b946de49fe49cfd1c4033bf0d88b0724b93b73d83ed1ec208442359860055f
SHA5120a029b8075cb5bfef0f499b2c807772b5be76db3e8a49cd7ffb5c890db7888c09c6aafe509c98e977d9df40a7e4e93e83c095e37cd3758ebd8d5cd2045ec0498
-
C:\Users\Admin\AppData\Local\Temp\F7E3.exeFilesize
451KB
MD5d72b372b0787fc4d852a106b333cc7c8
SHA16988123af95387fedc454af85e0c4f33f4b7556d
SHA25641626c59005232dbc0696b8a57f51fdde1035915ecdbd465c1f6ac7666069116
SHA51286d57d4588e10fd7ef2c35d7b9ce48b74d7863f9772c526972e39b294c9724f14bcbf98010bdb0fe788208624c2b03e5cdd2dbd47933d05445a48b66c75f377c
-
C:\Users\Admin\AppData\Local\Temp\F7E3.exeFilesize
451KB
MD5d72b372b0787fc4d852a106b333cc7c8
SHA16988123af95387fedc454af85e0c4f33f4b7556d
SHA25641626c59005232dbc0696b8a57f51fdde1035915ecdbd465c1f6ac7666069116
SHA51286d57d4588e10fd7ef2c35d7b9ce48b74d7863f9772c526972e39b294c9724f14bcbf98010bdb0fe788208624c2b03e5cdd2dbd47933d05445a48b66c75f377c
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\e94c2b28f2\rovwer.exeFilesize
246KB
MD5807a6d765170a140e78a175564826016
SHA1bb02e2cd7cfcf1d2100f2cc2929044264a602bc3
SHA2564344b8091ea83418d19a29894058c65b13eb3d932f20abe830da3bf4723e8c3f
SHA512a1c5c312f35f6e067abfe961c0f4adceca5bf6d5c8775fe9be1ea37b6391ceddcbffe4e9c6613d85aa27bcf49ce334b48c34e3018a2719957c9130460826e6c5
-
C:\Users\Admin\AppData\Local\Temp\tmp22E.tmp.batFilesize
152B
MD52da27f9f1d6a196326461a5cc9a0df74
SHA1b327260ba2dd7e82fae798f7837b5b4306aacbe0
SHA2560746801b4ab55f1b6417ed8d1cad3ce663bcd7c44ff890de1471d878c0d309c5
SHA512d08af0372d8d0d48f8b9583706894aea5b9e9c1a2052b4000cc33de9954a0aa459fc4a93115a5727e4333aa5825f3122a1b3828d269bb171fdcc47baa278fe05
-
C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dllFilesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
C:\Users\Admin\AppData\Roaming\80b59841e5c623\cred64.dllFilesize
126KB
MD5522adad0782501491314a78c7f32006b
SHA1e487edceeef3a41e2a8eea1e684bcbc3b39adb97
SHA256351fd9b73fa0cbbdfbce0793ca41544f5191650d79317a34024f3c09f73ac9ba
SHA5125f8a103deea3ed5f8641d1f4c91a4f891a8208b679cadbfac4a068afbad0d2f777cd29ace4bdfec590e722435473e4f8465fb80d5cda792dc0236646580101a7
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Roaming\EAEHCHcAAKSescACHUHCAAHKhACsKfCeCHhFCAHFAEehaheeHsAKhuh.exeFilesize
836KB
MD5edb6463d39eb1305c07400d169a40eba
SHA1456f4da4c204f7dd77af1834275213f663128e11
SHA256b0319fee29612b6f40ee9a9368cc23273c233547d9b1aa3bb551f8b57496ceb9
SHA512ab03697252ef332f4c8373bc47e3584302b58d3b314cecf9f9f39b3bbc7b1771080671185c4d29d57b1cfcc605afe70132ece7667d638a64096853e6d7c72306
-
C:\Users\Admin\AppData\Roaming\jiburdbFilesize
188KB
MD5356f0831694fb49e590da55f15f78c4a
SHA194e02786e55686b320a864d8e653f9f6a6778f95
SHA2560ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8
SHA51221a815fe0b01fe6b0b53ca0889eb961e5a6497c870ccc849f1e6ceb63b699f709896f230f08756861c8cde1cc746d6a79a5c15ce9dfb3462d94c35e08a929f40
-
C:\Users\Admin\AppData\Roaming\jiburdbFilesize
188KB
MD5356f0831694fb49e590da55f15f78c4a
SHA194e02786e55686b320a864d8e653f9f6a6778f95
SHA2560ee0b221a66364634a9a17f545a5c969add6e4ea5489dad665f3376c9712f9b8
SHA51221a815fe0b01fe6b0b53ca0889eb961e5a6497c870ccc849f1e6ceb63b699f709896f230f08756861c8cde1cc746d6a79a5c15ce9dfb3462d94c35e08a929f40
-
memory/372-187-0x0000000000000000-mapping.dmp
-
memory/372-239-0x00000000003E0000-0x0000000000455000-memory.dmpFilesize
468KB
-
memory/760-249-0x0000000000000000-mapping.dmp
-
memory/760-258-0x0000000001170000-0x0000000001179000-memory.dmpFilesize
36KB
-
memory/760-255-0x0000000001180000-0x0000000001185000-memory.dmpFilesize
20KB
-
memory/816-171-0x0000000000E10000-0x0000000000F30000-memory.dmpFilesize
1.1MB
-
memory/816-183-0x00007FF82F590000-0x00007FF830051000-memory.dmpFilesize
10.8MB
-
memory/816-168-0x0000000000000000-mapping.dmp
-
memory/816-272-0x00007FF82F590000-0x00007FF830051000-memory.dmpFilesize
10.8MB
-
memory/1236-279-0x0000000000000000-mapping.dmp
-
memory/1236-284-0x0000000001170000-0x000000000117B000-memory.dmpFilesize
44KB
-
memory/1236-283-0x0000000001180000-0x0000000001186000-memory.dmpFilesize
24KB
-
memory/1292-221-0x0000000000000000-mapping.dmp
-
memory/1292-237-0x0000000001170000-0x000000000117B000-memory.dmpFilesize
44KB
-
memory/1292-234-0x0000000001180000-0x0000000001187000-memory.dmpFilesize
28KB
-
memory/1456-219-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/1456-159-0x00000000006F0000-0x000000000072E000-memory.dmpFilesize
248KB
-
memory/1456-167-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/1456-218-0x00000000007DD000-0x00000000007FC000-memory.dmpFilesize
124KB
-
memory/1456-156-0x00000000007DD000-0x00000000007FC000-memory.dmpFilesize
124KB
-
memory/1456-148-0x0000000000000000-mapping.dmp
-
memory/1492-271-0x0000000000000000-mapping.dmp
-
memory/1492-277-0x0000000000B60000-0x0000000000B87000-memory.dmpFilesize
156KB
-
memory/1492-275-0x0000000000B90000-0x0000000000BB2000-memory.dmpFilesize
136KB
-
memory/1560-273-0x00007FF82F640000-0x00007FF830101000-memory.dmpFilesize
10.8MB
-
memory/1560-268-0x0000000000000000-mapping.dmp
-
memory/1608-174-0x0000000000000000-mapping.dmp
-
memory/1648-163-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1648-155-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1648-154-0x0000000000000000-mapping.dmp
-
memory/1912-278-0x0000000000000000-mapping.dmp
-
memory/2004-289-0x0000000001170000-0x000000000117B000-memory.dmpFilesize
44KB
-
memory/2004-288-0x0000000001180000-0x0000000001188000-memory.dmpFilesize
32KB
-
memory/2004-286-0x0000000000000000-mapping.dmp
-
memory/2188-335-0x0000000000000000-mapping.dmp
-
memory/2508-274-0x0000000000000000-mapping.dmp
-
memory/2520-315-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-314-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-320-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-312-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-311-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-313-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-310-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-319-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-316-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-309-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-308-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-307-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-321-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-306-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-317-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2520-318-0x0000000003320000-0x0000000003330000-memory.dmpFilesize
64KB
-
memory/2552-250-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-247-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-252-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-232-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-259-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-246-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-254-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-245-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-264-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-244-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-223-0x0000000000000000-mapping.dmp
-
memory/2552-262-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2552-261-0x0000000000620000-0x00000000006F6000-memory.dmpFilesize
856KB
-
memory/2720-200-0x0000000000000000-mapping.dmp
-
memory/3076-208-0x00000000007AC000-0x00000000007CB000-memory.dmpFilesize
124KB
-
memory/3076-209-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/3076-194-0x0000000000000000-mapping.dmp
-
memory/3076-293-0x00000000007AC000-0x00000000007CB000-memory.dmpFilesize
124KB
-
memory/3120-242-0x0000000000690000-0x000000000069F000-memory.dmpFilesize
60KB
-
memory/3120-233-0x0000000000000000-mapping.dmp
-
memory/3120-253-0x00000000006A0000-0x00000000006A9000-memory.dmpFilesize
36KB
-
memory/3468-207-0x0000000005AC0000-0x0000000005AFC000-memory.dmpFilesize
240KB
-
memory/3468-145-0x00000000005B0000-0x00000000006B0000-memory.dmpFilesize
1024KB
-
memory/3468-203-0x0000000005340000-0x0000000005958000-memory.dmpFilesize
6.1MB
-
memory/3468-205-0x00000000059B0000-0x0000000005ABA000-memory.dmpFilesize
1.0MB
-
memory/3468-190-0x0000000004D90000-0x0000000005334000-memory.dmpFilesize
5.6MB
-
memory/3468-206-0x00000000005B0000-0x00000000006B0000-memory.dmpFilesize
1024KB
-
memory/3468-141-0x0000000000000000-mapping.dmp
-
memory/3468-147-0x0000000000400000-0x00000000005B0000-memory.dmpFilesize
1.7MB
-
memory/3468-204-0x0000000005990000-0x00000000059A2000-memory.dmpFilesize
72KB
-
memory/3468-146-0x00000000020A0000-0x00000000020F8000-memory.dmpFilesize
352KB
-
memory/3480-151-0x0000000000000000-mapping.dmp
-
memory/3488-276-0x0000000000000000-mapping.dmp
-
memory/3488-281-0x0000000000880000-0x0000000000889000-memory.dmpFilesize
36KB
-
memory/3488-280-0x0000000000890000-0x0000000000895000-memory.dmpFilesize
20KB
-
memory/3592-201-0x00007FF82F590000-0x00007FF830051000-memory.dmpFilesize
10.8MB
-
memory/3592-182-0x00000000004B0000-0x0000000000586000-memory.dmpFilesize
856KB
-
memory/3592-177-0x0000000000000000-mapping.dmp
-
memory/3592-191-0x00007FF82F590000-0x00007FF830051000-memory.dmpFilesize
10.8MB
-
memory/3744-213-0x0000000000000000-mapping.dmp
-
memory/3780-195-0x000000000073D000-0x000000000075C000-memory.dmpFilesize
124KB
-
memory/3780-217-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/3780-164-0x0000000000000000-mapping.dmp
-
memory/3780-185-0x00000000021C0000-0x00000000021FE000-memory.dmpFilesize
248KB
-
memory/3780-216-0x000000000073D000-0x000000000075C000-memory.dmpFilesize
124KB
-
memory/3780-186-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/3980-180-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/3980-192-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/3980-199-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/3980-184-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/3980-181-0x0000000000BE8EA0-mapping.dmp
-
memory/3980-202-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/3980-188-0x0000000000400000-0x0000000000BEB000-memory.dmpFilesize
7.9MB
-
memory/4320-139-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/4320-140-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/4320-138-0x000000000072D000-0x000000000073E000-memory.dmpFilesize
68KB
-
memory/4436-265-0x0000000000000000-mapping.dmp
-
memory/4436-266-0x0000000000D40000-0x0000000000D46000-memory.dmpFilesize
24KB
-
memory/4436-267-0x0000000000D30000-0x0000000000D3C000-memory.dmpFilesize
48KB
-
memory/4488-282-0x0000000000000000-mapping.dmp
-
memory/4488-287-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/4488-285-0x0000000000100000-0x000000000010D000-memory.dmpFilesize
52KB
-
memory/4600-215-0x0000000000000000-mapping.dmp
-
memory/4636-222-0x0000000000000000-mapping.dmp
-
memory/4640-291-0x0000000005750000-0x00000000057B6000-memory.dmpFilesize
408KB
-
memory/4640-294-0x0000000007280000-0x00000000077AC000-memory.dmpFilesize
5.2MB
-
memory/4640-290-0x0000000005E50000-0x0000000005EE2000-memory.dmpFilesize
584KB
-
memory/4640-292-0x0000000006B80000-0x0000000006D42000-memory.dmpFilesize
1.8MB
-
memory/4640-224-0x0000000000000000-mapping.dmp
-
memory/4640-227-0x0000000000A20000-0x0000000000A48000-memory.dmpFilesize
160KB
-
memory/4648-229-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4648-228-0x0000000000000000-mapping.dmp
-
memory/4912-134-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/4912-132-0x00000000005BE000-0x00000000005CE000-memory.dmpFilesize
64KB
-
memory/4912-135-0x0000000000400000-0x000000000058A000-memory.dmpFilesize
1.5MB
-
memory/4912-133-0x00000000022C0000-0x00000000022C9000-memory.dmpFilesize
36KB
-
memory/5068-211-0x0000000000760000-0x000000000077F000-memory.dmpFilesize
124KB
-
memory/5068-212-0x0000000000400000-0x0000000000599000-memory.dmpFilesize
1.6MB
-
memory/5068-193-0x0000000000000000-mapping.dmp