Analysis
-
max time kernel
162s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 14:18
Static task
static1
Behavioral task
behavioral1
Sample
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
Resource
win10v2004-20220812-en
General
-
Target
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe
-
Size
490KB
-
MD5
1cadb5225ab18c0ef03ae571b1784087
-
SHA1
40a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
-
SHA256
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
-
SHA512
c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
SSDEEP
12288:4JjWl4tbn/0/n3vC8EOVg7d6UBsOjX0hmLXBconfaps6IOElix90g:siGtT/0/vC8EOVgB6UKOjkhsxconfcbX
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 3 IoCs
Processes:
appinit.exeappinit.exeappinit.exepid process 2136 appinit.exe 4512 appinit.exe 3948 appinit.exe -
Processes:
resource yara_rule behavioral2/memory/2820-191-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral2/memory/2820-192-0x0000000001610000-0x0000000001720000-memory.dmp upx behavioral2/memory/2820-193-0x0000000001610000-0x0000000001720000-memory.dmp upx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe -
Loads dropped DLL 14 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exepid process 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 2136 appinit.exe 2136 appinit.exe 2136 appinit.exe 2136 appinit.exe 2136 appinit.exe 2136 appinit.exe 2136 appinit.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
appinit.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run appinit.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" appinit.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run appinit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\{90783-8547-9081-90}\\appinit.exe" appinit.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exeappinit.exeappinit.exedescription pid process target process PID 4136 set thread context of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 set thread context of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 2136 set thread context of 4512 2136 appinit.exe appinit.exe PID 4512 set thread context of 3948 4512 appinit.exe appinit.exe PID 3948 set thread context of 2820 3948 appinit.exe explorer.exe -
Drops file in Windows directory 5 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exeappinit.exedescription ioc process File opened for modification C:\Windows\{90783-8547-9081-90}\appinit.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File created C:\Windows\{90783-8547-9081-90}\appinit.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File opened for modification C:\Windows\{90783-8547-9081-90}\ 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe File opened for modification C:\Windows\{90783-8547-9081-90}\appinit.exe appinit.exe File opened for modification C:\Windows\{90783-8547-9081-90}\ appinit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3820 2820 WerFault.exe explorer.exe -
NSIS installer 8 IoCs
Processes:
resource yara_rule C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_1 C:\Windows\{90783-8547-9081-90}\appinit.exe nsis_installer_2 -
Modifies registry class 1 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exepid process 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exedescription pid process target process PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 4136 wrote to memory of 3056 4136 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 3056 wrote to memory of 2256 3056 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe PID 2256 wrote to memory of 3908 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3908 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 1356 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 1356 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 1356 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3088 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3088 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 1468 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 1468 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 1468 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4752 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4752 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4036 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4036 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4036 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3384 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3384 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3176 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3176 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3176 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4676 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4676 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 996 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 996 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 996 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4656 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4656 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4652 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4652 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4652 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4820 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4820 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 4044 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4044 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 4044 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3876 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3876 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3380 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3380 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3380 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe explorer.exe PID 2256 wrote to memory of 3436 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe PID 2256 wrote to memory of 3436 2256 89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"C:\Users\Admin\AppData\Local\Temp\89cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7.exe"3⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"4⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Windows\{90783-8547-9081-90}\appinit.exe"C:\Windows\{90783-8547-9081-90}\appinit.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 128⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2820 -ip 28201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Digumedit.dllFilesize
3KB
MD5a97ee817e4dd5b54cd56082a6c1fd16f
SHA1d9ba655f1ba09949a4214b247c3ef2877e5c9961
SHA256c5be47563145e207dfa27b488fd99b8b527ef937dfc49f3ad592a657d0920354
SHA512a2938b5f3dced78caca3bbc7e035dc9ee319d88d612f00146ec9ad166a27c15b8d271174f6f0a1ff1ea5babc53b52a6514d13a71d7dddad4a5b5bdfdf429daf9
-
C:\Users\Admin\AppData\Local\Temp\Qenubeq.mupFilesize
407KB
MD56ab85a46773fb0391221c0fcb3baac48
SHA162d8a1464178229bfac86723337f64ff21c53260
SHA256afc3f0da9c05b38e381bca955f563f1b580ecfb712412049648614ea53a3917e
SHA512961cdb5a1a49da9dbf32cc92413fdb864703c67a0eb6773153f794aeabdd54d6e2705eae9804f4d0d895ce646041e36842c2baa28780187bd38c445915beeef6
-
C:\Users\Admin\AppData\Local\Temp\Qenubeq.mupFilesize
407KB
MD56ab85a46773fb0391221c0fcb3baac48
SHA162d8a1464178229bfac86723337f64ff21c53260
SHA256afc3f0da9c05b38e381bca955f563f1b580ecfb712412049648614ea53a3917e
SHA512961cdb5a1a49da9dbf32cc92413fdb864703c67a0eb6773153f794aeabdd54d6e2705eae9804f4d0d895ce646041e36842c2baa28780187bd38c445915beeef6
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Witovehomo.dllFilesize
32KB
MD53d0806de97e6de6f47854c1b410cda86
SHA11f90d51dca99547ffa79dfc554e814e17a3b5091
SHA256a933255cc4cfa64cdb08279d97e80a631f526ee06cced20cec761e120d3320e0
SHA5121e6ec32e66cfdb1984f1bc97dfc56259c369ba3d863d022acda0b40db5008ad6e3e875f0a387e89a5d184d08414bd546381a9473aa1452fb5f6d8270f99afa28
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\Zexapefag.dllFilesize
3KB
MD5c0db9a93373a22e59c67eacc4b7d0e32
SHA1237c3a195c5949149188c1bf68f7b3821d7fe6c7
SHA256dac117e445dd2a5b810fa5e0d9704767172c9d6c348c376a7b57c1ae161bd4f0
SHA51221e408195d02463dc3134028f12b29f84c734a1b23f728dd1c63a7632ed9fc778223ebeb168cb5f37988e7b58197fe021c3ce9fbb0bb4ac7e23bb0fb36c6e3c1
-
C:\Users\Admin\AppData\Local\Temp\nsrCB74.tmp\System.dllFilesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
C:\Users\Admin\AppData\Local\Temp\nswA365.tmp\System.dllFilesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.nfoFilesize
3KB
MD5f7fae5c69b6ae78f297542f1c1405dcf
SHA1e275446b5bff321022e3833f67f63d1d0cca3883
SHA256c13949237267afdf33459d743748646af80dd77f291f0a0644b9edb7953a0d94
SHA512953f4f55494e58273a0d371db6cfcc10a18e9374d411eb8ae5e469c7a80bf706940ad1569a475a8c52d5e43ab7127c2206831d7aec97f6a3bc8defa67e8c65f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\G5lZfyWn78ljg6\G5lZfyWn78ljg6.svrFilesize
358KB
MD5ad69242f4bf9548496051bd95ac05e1e
SHA1913292f6b83adf41337fd50201ad341500abc8b0
SHA2562663fdfe0fe4c37532f919282d035579bf84a895be5971982437cffbd41bdb1b
SHA51209bed3adc8427e4aeec4e32dfd0640da71d2839b62973e4bae94f0965c5836028511295d99be878af388789fc020117972c3cf51d5a2ef1899aeb9d43c2fd94e
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
C:\Windows\{90783-8547-9081-90}\appinit.exeFilesize
490KB
MD51cadb5225ab18c0ef03ae571b1784087
SHA140a62eba4fa73b7cfeb8bd4b7cfc64fc7042cde1
SHA25689cb356a03d19529af7b3ce8437c1339d7171a2d7239a6f63dc5d0105c3b29e7
SHA512c4d2f0612307628e2e40c5b39b93281fedce92bae26bba0c80a3e5f0039502f9cd75f558f823e3e45f195f1efd4baee88419febcab894a02f02725cd5a96661a
-
memory/2136-158-0x0000000000000000-mapping.dmp
-
memory/2136-188-0x0000000002360000-0x000000000236D000-memory.dmpFilesize
52KB
-
memory/2136-170-0x0000000002360000-0x000000000236D000-memory.dmpFilesize
52KB
-
memory/2136-164-0x0000000002360000-0x000000000236D000-memory.dmpFilesize
52KB
-
memory/2136-169-0x0000000002360000-0x000000000236D000-memory.dmpFilesize
52KB
-
memory/2256-150-0x0000000000000000-mapping.dmp
-
memory/2256-157-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2256-151-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2256-152-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2256-171-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2256-153-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2256-155-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/2820-193-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/2820-192-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/2820-191-0x0000000001610000-0x0000000001720000-memory.dmpFilesize
1.1MB
-
memory/2820-190-0x0000000000000000-mapping.dmp
-
memory/3056-143-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/3056-145-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/3056-142-0x0000000000000000-mapping.dmp
-
memory/3056-154-0x0000000000400000-0x0000000000469000-memory.dmpFilesize
420KB
-
memory/3948-181-0x0000000000000000-mapping.dmp
-
memory/3948-187-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/3948-195-0x0000000000400000-0x000000000046F000-memory.dmpFilesize
444KB
-
memory/4136-141-0x00000000027F0000-0x00000000027FD000-memory.dmpFilesize
52KB
-
memory/4136-156-0x00000000027F0000-0x00000000027FD000-memory.dmpFilesize
52KB
-
memory/4136-135-0x00000000027F0000-0x00000000027FD000-memory.dmpFilesize
52KB
-
memory/4136-140-0x00000000027F0000-0x00000000027FD000-memory.dmpFilesize
52KB
-
memory/4512-172-0x0000000000000000-mapping.dmp