Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2022 17:32
Static task
static1
Behavioral task
behavioral1
Sample
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe
Resource
win7-20220812-en
General
-
Target
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe
-
Size
9.9MB
-
MD5
656725f09aa6a07f41fef88b362ad8b9
-
SHA1
9b4949a9d2d7ddbbefb5bb553bed4a39d2b392c9
-
SHA256
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f
-
SHA512
27eec396079486535a8a870ed2c8d1c4fa97cca0cdf72a5331516c0d7f41d43b84e68844a61f0b9722c1a1da96300e7e29303c3edade635df67807a42003038b
-
SSDEEP
6144:YJl5cP2e8F3cUAojUmFvMKpiC+afJRda3RIkvNIyI/VEpAl/JgIj0oTYibGRrgUW:MiTTeLe0D4
Malware Config
Extracted
asyncrat
0.5.7B
Katayumi
normal-knife.auto.playit.gg:54950
normal-knife.auto.playit.gg:7707
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
ZxKKE4oK8.exe
-
install_folder
%Temp%
Signatures
-
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Turns off Windows Defender SpyNet reporting 2 TTPs
-
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe = "0" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Async RAT payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1536-178-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Executes dropped EXE 12 IoCs
Processes:
DD8989123MD.exeK8MN9DA.exeLunaInjector.exeDD8989123MD.exeDD8989123MD.exeK8MN9DA.exeK8MN9DA.exeK8MN9DA.exeK8MN9DA.exeZxKKE4oK8.exeZxKKE4oK8.exeDD8989123MD.exepid process 2156 DD8989123MD.exe 2316 K8MN9DA.exe 1144 LunaInjector.exe 3492 DD8989123MD.exe 3644 DD8989123MD.exe 4960 K8MN9DA.exe 3332 K8MN9DA.exe 2752 K8MN9DA.exe 1536 K8MN9DA.exe 2688 ZxKKE4oK8.exe 2536 ZxKKE4oK8.exe 3952 DD8989123MD.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
DD8989123MD.exeK8MN9DA.exeZxKKE4oK8.exe531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exeK8MN9DA.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation DD8989123MD.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation K8MN9DA.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation ZxKKE4oK8.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation K8MN9DA.exe -
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SpyNetReporting = "0" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Spynet\SubmitSamplesConsent = "0" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe = "0" 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 43 wtfismyip.com 44 wtfismyip.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 50 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exeDD8989123MD.exeK8MN9DA.exeZxKKE4oK8.exepid process 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exeDD8989123MD.exeK8MN9DA.exeZxKKE4oK8.exeDD8989123MD.exedescription pid process target process PID 4416 set thread context of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 2156 set thread context of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2316 set thread context of 1536 2316 K8MN9DA.exe K8MN9DA.exe PID 2688 set thread context of 2536 2688 ZxKKE4oK8.exe ZxKKE4oK8.exe PID 3644 set thread context of 3952 3644 DD8989123MD.exe DD8989123MD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 5 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4740 4416 WerFault.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 1684 2156 WerFault.exe DD8989123MD.exe 2720 2316 WerFault.exe K8MN9DA.exe 1192 2688 WerFault.exe ZxKKE4oK8.exe 4468 3952 WerFault.exe DD8989123MD.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 4972 timeout.exe 4852 timeout.exe 3568 timeout.exe 3572 timeout.exe 4044 timeout.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
powershell.exe531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exeDD8989123MD.exeK8MN9DA.exeK8MN9DA.exeZxKKE4oK8.exeDD8989123MD.exepid process 1200 powershell.exe 1200 powershell.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 2156 DD8989123MD.exe 2316 K8MN9DA.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2156 DD8989123MD.exe 2156 DD8989123MD.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 2316 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 1536 K8MN9DA.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 2688 ZxKKE4oK8.exe 3952 DD8989123MD.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exepowershell.exeDD8989123MD.exeK8MN9DA.exeK8MN9DA.exeZxKKE4oK8.exeZxKKE4oK8.exeDD8989123MD.exedescription pid process Token: SeDebugPrivilege 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe Token: SeDebugPrivilege 1200 powershell.exe Token: SeDebugPrivilege 2156 DD8989123MD.exe Token: SeDebugPrivilege 2316 K8MN9DA.exe Token: SeDebugPrivilege 1536 K8MN9DA.exe Token: SeDebugPrivilege 2688 ZxKKE4oK8.exe Token: SeDebugPrivilege 2536 ZxKKE4oK8.exe Token: SeDebugPrivilege 3952 DD8989123MD.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.execmd.exe531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exeLunaInjector.exeK8MN9DA.exeDD8989123MD.execmd.execmd.execmd.exedescription pid process target process PID 4416 wrote to memory of 1200 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe powershell.exe PID 4416 wrote to memory of 1200 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe powershell.exe PID 4416 wrote to memory of 1200 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe powershell.exe PID 4416 wrote to memory of 256 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe cmd.exe PID 4416 wrote to memory of 256 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe cmd.exe PID 4416 wrote to memory of 256 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe cmd.exe PID 256 wrote to memory of 4972 256 cmd.exe timeout.exe PID 256 wrote to memory of 4972 256 cmd.exe timeout.exe PID 256 wrote to memory of 4972 256 cmd.exe timeout.exe PID 4416 wrote to memory of 640 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 640 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 640 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 4416 wrote to memory of 1280 4416 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe PID 1280 wrote to memory of 2156 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe DD8989123MD.exe PID 1280 wrote to memory of 2156 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe DD8989123MD.exe PID 1280 wrote to memory of 2156 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe DD8989123MD.exe PID 1280 wrote to memory of 2316 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe K8MN9DA.exe PID 1280 wrote to memory of 2316 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe K8MN9DA.exe PID 1280 wrote to memory of 2316 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe K8MN9DA.exe PID 1280 wrote to memory of 1144 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe LunaInjector.exe PID 1280 wrote to memory of 1144 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe LunaInjector.exe PID 1280 wrote to memory of 1144 1280 531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe LunaInjector.exe PID 1144 wrote to memory of 544 1144 LunaInjector.exe cmd.exe PID 1144 wrote to memory of 544 1144 LunaInjector.exe cmd.exe PID 2316 wrote to memory of 3356 2316 K8MN9DA.exe cmd.exe PID 2316 wrote to memory of 3356 2316 K8MN9DA.exe cmd.exe PID 2316 wrote to memory of 3356 2316 K8MN9DA.exe cmd.exe PID 2156 wrote to memory of 1776 2156 DD8989123MD.exe cmd.exe PID 2156 wrote to memory of 1776 2156 DD8989123MD.exe cmd.exe PID 2156 wrote to memory of 1776 2156 DD8989123MD.exe cmd.exe PID 1776 wrote to memory of 4852 1776 cmd.exe timeout.exe PID 1776 wrote to memory of 4852 1776 cmd.exe timeout.exe PID 1776 wrote to memory of 4852 1776 cmd.exe timeout.exe PID 3356 wrote to memory of 3568 3356 cmd.exe timeout.exe PID 3356 wrote to memory of 3568 3356 cmd.exe timeout.exe PID 3356 wrote to memory of 3568 3356 cmd.exe timeout.exe PID 544 wrote to memory of 3592 544 cmd.exe chcp.com PID 544 wrote to memory of 3592 544 cmd.exe chcp.com PID 2156 wrote to memory of 3492 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3492 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3492 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2316 wrote to memory of 4960 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 4960 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 4960 2316 K8MN9DA.exe K8MN9DA.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2156 wrote to memory of 3644 2156 DD8989123MD.exe DD8989123MD.exe PID 2316 wrote to memory of 3332 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 3332 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 3332 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 2752 2316 K8MN9DA.exe K8MN9DA.exe PID 2316 wrote to memory of 2752 2316 K8MN9DA.exe K8MN9DA.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"1⤵
- Modifies Windows Defender Real-time Protection settings
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Windows security modification
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 12⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 13⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"C:\Users\Admin\AppData\Local\Temp\531bf9fac0acb821391741eb0ed737df303aba700db962771e7795845bf8c72f.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 19006⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 15004⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 14⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 15⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"4⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exe"4⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ZxKKE4oK8" /tr '"C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"' & exit5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ZxKKE4oK8" /tr '"C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"'6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp89D1.tmp.bat""5⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 36⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout 17⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 18⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 14727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 14644⤵
- Program crash
-
C:\Users\Admin\AppData\Roaming\LunaInjector.exe"C:\Users\Admin\AppData\Roaming\LunaInjector.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\6699.tmp\669A.tmp\66AB.bat C:\Users\Admin\AppData\Roaming\LunaInjector.exe"4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650015⤵
-
C:\Windows\system32\mode.commode 82,245⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4416 -s 22722⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4416 -ip 44161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2156 -ip 21561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2316 -ip 23161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2688 -ip 26881⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3952 -ip 39521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\DD8989123MD.exe.logFilesize
1KB
MD5b5291f3dcf2c13784e09a057f2e43d13
SHA1fbb72f4b04269e0d35b1d9c29d02d63dbc7ad07e
SHA256ad995b51344d71019f96fc3a424de00256065daad8595ff599f6849c87ae75ce
SHA51211c89caac425bccaa24e2bb24c6f2b4e6d6863278bf8a5304a42bb44475b08ca586e09143e7d5b14db7f1cd9adacd5358769e0d999dc348073431031067bd4d4
-
C:\Users\Admin\AppData\Local\Temp\6699.tmp\669A.tmp\66AB.batFilesize
438B
MD5ad81fd823266aabb73a229b8d842720e
SHA109c851304e0626bbf5fd15aa4212e14c9a8294a2
SHA256ad3ce6e067e2210681ffca11d32d91c6be6cc13fca5f9fb7ab7a73e4daa31f00
SHA512201bc9e51c00bbb38e949c06b59adcb32f9a07caeba38fc92db7ec8f9c54e43932fed045982cd4fa56d605f082f44828de7f9ad732777fc7ca86a4ff7f91989e
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exeFilesize
545KB
MD59c8b5486b38230c7c1f934c01a895d95
SHA185626e89ca6a0a3838786698ec670d909c5eec5b
SHA256fd8eb30f8c98d4e97459b051f6e14a52e6194e4b431ae1243c8638f08701f5a5
SHA5125555b9c7ccef651f03787f7531eea69023fc7c4aaa2315aba878d490f1a655afbd6347da0721d5e88cad3a956e399d21dfda2f2d2a83afc1c7277f1468a17450
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exeFilesize
545KB
MD59c8b5486b38230c7c1f934c01a895d95
SHA185626e89ca6a0a3838786698ec670d909c5eec5b
SHA256fd8eb30f8c98d4e97459b051f6e14a52e6194e4b431ae1243c8638f08701f5a5
SHA5125555b9c7ccef651f03787f7531eea69023fc7c4aaa2315aba878d490f1a655afbd6347da0721d5e88cad3a956e399d21dfda2f2d2a83afc1c7277f1468a17450
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exeFilesize
545KB
MD59c8b5486b38230c7c1f934c01a895d95
SHA185626e89ca6a0a3838786698ec670d909c5eec5b
SHA256fd8eb30f8c98d4e97459b051f6e14a52e6194e4b431ae1243c8638f08701f5a5
SHA5125555b9c7ccef651f03787f7531eea69023fc7c4aaa2315aba878d490f1a655afbd6347da0721d5e88cad3a956e399d21dfda2f2d2a83afc1c7277f1468a17450
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exeFilesize
545KB
MD59c8b5486b38230c7c1f934c01a895d95
SHA185626e89ca6a0a3838786698ec670d909c5eec5b
SHA256fd8eb30f8c98d4e97459b051f6e14a52e6194e4b431ae1243c8638f08701f5a5
SHA5125555b9c7ccef651f03787f7531eea69023fc7c4aaa2315aba878d490f1a655afbd6347da0721d5e88cad3a956e399d21dfda2f2d2a83afc1c7277f1468a17450
-
C:\Users\Admin\AppData\Local\Temp\DD8989123MD.exeFilesize
545KB
MD59c8b5486b38230c7c1f934c01a895d95
SHA185626e89ca6a0a3838786698ec670d909c5eec5b
SHA256fd8eb30f8c98d4e97459b051f6e14a52e6194e4b431ae1243c8638f08701f5a5
SHA5125555b9c7ccef651f03787f7531eea69023fc7c4aaa2315aba878d490f1a655afbd6347da0721d5e88cad3a956e399d21dfda2f2d2a83afc1c7277f1468a17450
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\K8MN9DA.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\ZxKKE4oK8.exeFilesize
660KB
MD5cc62fe37de863f616d672eaf6b22b0c3
SHA12aca0fd587e4a998e749162a2a12f40bc49d50e7
SHA256edefa1d69e62fd464ffd2599c369b147edcff115e1f7a0454d9d9b567ce15d1b
SHA5127923d36d4651062684058c817cf2dd19295864e7bc82d33b8120ca3695390d5610cf37731f92f8acbb936df6f72e13c9cb1d64d4b3b13aafd82374bce1a0ac4d
-
C:\Users\Admin\AppData\Local\Temp\tmp89D1.tmp.batFilesize
156B
MD50166a8a051c8a26f365a15dd89bd6bc1
SHA1c53329a1f9cd616cccfbdcb858382ff10b7007a4
SHA2562e40230e00a157ce817afae15055346d346924b1a749a16b49af18a7477f4772
SHA5127e80f5d0f814ceb0254fcf3b976baf2b03e8e63d47c4231f1b2676e08991b0b655e3c2b71d281f5d731f3534ed9afc46db0958adbe53133bd6f15b28f562e134
-
C:\Users\Admin\AppData\Roaming\LunaInjector.exeFilesize
89KB
MD538bece8d537dea0d0bf7603c073aa90c
SHA1fc70b8b4d22b323fe9e886f36620269d6c791eac
SHA256261b67c10cca406ce934032f7e6da36b8408db3fce6df7d7a37dca69703c59cb
SHA512224d70c8f2b8c98456177cd087faa77436c86fbcd4fe36ae410c6d184181b30cbd50718fbfa347b85a0d2d303f273197fd9fea5addb28538eab43d84f527185d
-
C:\Users\Admin\AppData\Roaming\LunaInjector.exeFilesize
89KB
MD538bece8d537dea0d0bf7603c073aa90c
SHA1fc70b8b4d22b323fe9e886f36620269d6c791eac
SHA256261b67c10cca406ce934032f7e6da36b8408db3fce6df7d7a37dca69703c59cb
SHA512224d70c8f2b8c98456177cd087faa77436c86fbcd4fe36ae410c6d184181b30cbd50718fbfa347b85a0d2d303f273197fd9fea5addb28538eab43d84f527185d
-
memory/256-141-0x0000000000000000-mapping.dmp
-
memory/544-158-0x0000000000000000-mapping.dmp
-
memory/640-144-0x0000000000000000-mapping.dmp
-
memory/1144-155-0x0000000000000000-mapping.dmp
-
memory/1200-189-0x0000000007280000-0x0000000007316000-memory.dmpFilesize
600KB
-
memory/1200-143-0x00000000056B0000-0x00000000056CE000-memory.dmpFilesize
120KB
-
memory/1200-202-0x0000000005D00000-0x0000000005D08000-memory.dmpFilesize
32KB
-
memory/1200-136-0x0000000000000000-mapping.dmp
-
memory/1200-137-0x0000000002350000-0x0000000002386000-memory.dmpFilesize
216KB
-
memory/1200-196-0x0000000007340000-0x000000000735A000-memory.dmpFilesize
104KB
-
memory/1200-195-0x0000000007230000-0x000000000723E000-memory.dmpFilesize
56KB
-
memory/1200-138-0x0000000004F20000-0x0000000005548000-memory.dmpFilesize
6.2MB
-
memory/1200-188-0x0000000006FE0000-0x0000000006FEA000-memory.dmpFilesize
40KB
-
memory/1200-187-0x0000000006330000-0x000000000634A000-memory.dmpFilesize
104KB
-
memory/1200-186-0x0000000007620000-0x0000000007C9A000-memory.dmpFilesize
6.5MB
-
memory/1200-185-0x00000000061F0000-0x000000000620E000-memory.dmpFilesize
120KB
-
memory/1200-184-0x000000006F770000-0x000000006F7BC000-memory.dmpFilesize
304KB
-
memory/1200-183-0x0000000006210000-0x0000000006242000-memory.dmpFilesize
200KB
-
memory/1200-139-0x0000000004A30000-0x0000000004A52000-memory.dmpFilesize
136KB
-
memory/1200-140-0x0000000004E60000-0x0000000004EC6000-memory.dmpFilesize
408KB
-
memory/1280-145-0x0000000000000000-mapping.dmp
-
memory/1280-146-0x0000000000400000-0x000000000054E000-memory.dmpFilesize
1.3MB
-
memory/1536-178-0x0000000000400000-0x0000000000412000-memory.dmpFilesize
72KB
-
memory/1536-177-0x0000000000000000-mapping.dmp
-
memory/1764-193-0x0000000000000000-mapping.dmp
-
memory/1776-160-0x0000000000000000-mapping.dmp
-
memory/2156-150-0x00000000000F0000-0x000000000017E000-memory.dmpFilesize
568KB
-
memory/2156-147-0x0000000000000000-mapping.dmp
-
memory/2316-151-0x0000000000000000-mapping.dmp
-
memory/2316-154-0x0000000000340000-0x00000000003EA000-memory.dmpFilesize
680KB
-
memory/2408-190-0x0000000000000000-mapping.dmp
-
memory/2536-203-0x0000000000000000-mapping.dmp
-
memory/2688-197-0x0000000000000000-mapping.dmp
-
memory/2752-174-0x0000000000000000-mapping.dmp
-
memory/3012-191-0x0000000000000000-mapping.dmp
-
memory/3332-172-0x0000000000000000-mapping.dmp
-
memory/3356-159-0x0000000000000000-mapping.dmp
-
memory/3492-165-0x0000000000000000-mapping.dmp
-
memory/3568-163-0x0000000000000000-mapping.dmp
-
memory/3572-194-0x0000000000000000-mapping.dmp
-
memory/3592-164-0x0000000000000000-mapping.dmp
-
memory/3644-206-0x00000000056C0000-0x00000000056DE000-memory.dmpFilesize
120KB
-
memory/3644-169-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/3644-180-0x0000000005560000-0x000000000556A000-memory.dmpFilesize
40KB
-
memory/3644-182-0x0000000005610000-0x0000000005686000-memory.dmpFilesize
472KB
-
memory/3644-175-0x00000000053D0000-0x0000000005462000-memory.dmpFilesize
584KB
-
memory/3644-167-0x0000000000000000-mapping.dmp
-
memory/3952-207-0x0000000000000000-mapping.dmp
-
memory/3952-208-0x0000000000400000-0x0000000000408000-memory.dmpFilesize
32KB
-
memory/4044-201-0x0000000000000000-mapping.dmp
-
memory/4180-200-0x0000000000000000-mapping.dmp
-
memory/4416-132-0x0000000000CC0000-0x00000000016A8000-memory.dmpFilesize
9.9MB
-
memory/4416-135-0x0000000008350000-0x00000000083B6000-memory.dmpFilesize
408KB
-
memory/4416-134-0x0000000008890000-0x0000000008E34000-memory.dmpFilesize
5.6MB
-
memory/4416-133-0x0000000005FE0000-0x000000000607C000-memory.dmpFilesize
624KB
-
memory/4596-181-0x0000000000000000-mapping.dmp
-
memory/4852-162-0x0000000000000000-mapping.dmp
-
memory/4960-168-0x0000000000000000-mapping.dmp
-
memory/4972-142-0x0000000000000000-mapping.dmp