Overview
overview
10Static
static
100b74a99460...69.exe
windows10-1703-x64
100b74a99460...69.exe
windows7-x64
100b74a99460...69.exe
windows10-2004-x64
10VinyLauncher.exe
windows10-1703-x64
10VinyLauncher.exe
windows7-x64
8VinyLauncher.exe
windows10-2004-x64
10a2719b1149...56.exe
windows10-1703-x64
10a2719b1149...56.exe
windows7-x64
10a2719b1149...56.exe
windows10-2004-x64
10e6b6a16d17...58.exe
windows10-1703-x64
10e6b6a16d17...58.exe
windows7-x64
10e6b6a16d17...58.exe
windows10-2004-x64
10tmp.exe
windows10-1703-x64
10tmp.exe
windows7-x64
10tmp.exe
windows10-2004-x64
10Resubmissions
26-12-2022 00:04
221226-acrmcafe2y 1026-12-2022 00:03
221226-acfvvafe2x 1026-12-2022 00:03
221226-ab851acc75 1026-12-2022 00:03
221226-ab3m8afe2w 1026-12-2022 00:02
221226-abs4sacc74 1026-12-2022 00:01
221226-abb59scc72 10Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 00:03
Behavioral task
behavioral1
Sample
0b74a99460e2b8051d917c392d1079a646435188b84d6998afed2c458bf83a69.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
0b74a99460e2b8051d917c392d1079a646435188b84d6998afed2c458bf83a69.exe
Resource
win7-20220812-en
Behavioral task
behavioral3
Sample
0b74a99460e2b8051d917c392d1079a646435188b84d6998afed2c458bf83a69.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral4
Sample
VinyLauncher.exe
Resource
win10-20220901-en
Behavioral task
behavioral5
Sample
VinyLauncher.exe
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
VinyLauncher.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
Resource
win10-20220812-en
Behavioral task
behavioral8
Sample
a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
Resource
win7-20221111-en
Behavioral task
behavioral9
Sample
a2719b1149f9c0b195701ccb3050b8bb6ae5facb1845f8b562bbe48b96c69a56.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral10
Sample
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
Resource
win10-20220812-en
Behavioral task
behavioral11
Sample
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral13
Sample
tmp.exe
Resource
win10-20220812-en
Behavioral task
behavioral14
Sample
tmp.exe
Resource
win7-20221111-en
Behavioral task
behavioral15
Sample
tmp.exe
Resource
win10v2004-20220812-en
General
-
Target
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe
-
Size
1.3MB
-
MD5
adde6baef89ebb01b5e60f15610ba470
-
SHA1
edc49b43aa822b754ee617db11c3ffc1a3e79ec1
-
SHA256
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458
-
SHA512
89ebfaafca6347cced23fd73aee44483118d4806c339048df9ba9da5f775f84ce6b6876a8399617abfbf1ae23cfd0b78825f85f50efdcc2c9e3c88cb8e122a30
-
SSDEEP
24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Process spawned unexpected child process 27 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1864 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1720 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1624 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2004 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1984 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1656 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1728 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1744 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1084 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1340 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1272 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1312 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1632 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 764 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1328 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1600 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1736 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1000 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 584 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1116 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1956 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1092 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1972 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 928 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2020 1052 schtasks.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1676 1052 schtasks.exe -
Processes:
resource yara_rule C:\providercommon\DllCommonsvc.exe dcrat \providercommon\DllCommonsvc.exe dcrat C:\providercommon\DllCommonsvc.exe dcrat \providercommon\DllCommonsvc.exe dcrat behavioral11/memory/1644-65-0x0000000000D20000-0x0000000000E30000-memory.dmp dcrat C:\providercommon\conhost.exe dcrat C:\providercommon\conhost.exe dcrat behavioral11/memory/2412-105-0x00000000011C0000-0x00000000012D0000-memory.dmp dcrat C:\providercommon\conhost.exe dcrat C:\providercommon\conhost.exe dcrat C:\providercommon\conhost.exe dcrat behavioral11/memory/948-144-0x0000000000030000-0x0000000000140000-memory.dmp dcrat behavioral11/memory/688-180-0x00000000008E0000-0x00000000009F0000-memory.dmp dcrat C:\providercommon\conhost.exe dcrat -
Executes dropped EXE 6 IoCs
Processes:
DllCommonsvc.execonhost.execonhost.execonhost.execonhost.execonhost.exepid process 1644 DllCommonsvc.exe 2412 conhost.exe 2708 conhost.exe 2888 conhost.exe 948 conhost.exe 688 conhost.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1912 cmd.exe 1912 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops file in Program Files directory 2 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Program Files (x86)\Internet Explorer\WMIADAP.exe DllCommonsvc.exe File created C:\Program Files (x86)\Internet Explorer\75a57c1bdf437c DllCommonsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
DllCommonsvc.exedescription ioc process File created C:\Windows\SchCache\services.exe DllCommonsvc.exe File created C:\Windows\SchCache\c5b4cb5e9653cc DllCommonsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 27 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 1720 schtasks.exe 1528 schtasks.exe 1632 schtasks.exe 1972 schtasks.exe 1864 schtasks.exe 1656 schtasks.exe 1084 schtasks.exe 1272 schtasks.exe 1000 schtasks.exe 1116 schtasks.exe 1340 schtasks.exe 1624 schtasks.exe 1744 schtasks.exe 2020 schtasks.exe 1676 schtasks.exe 584 schtasks.exe 764 schtasks.exe 1328 schtasks.exe 1600 schtasks.exe 928 schtasks.exe 1728 schtasks.exe 1736 schtasks.exe 2004 schtasks.exe 1984 schtasks.exe 1312 schtasks.exe 1956 schtasks.exe 1092 schtasks.exe -
Processes:
conhost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 conhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 conhost.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
DllCommonsvc.execonhost.execonhost.execonhost.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.exepowershell.exepid process 1644 DllCommonsvc.exe 2412 conhost.exe 2708 conhost.exe 2888 conhost.exe 2040 powershell.exe 1568 powershell.exe 112 powershell.exe 328 powershell.exe 2120 powershell.exe 1112 powershell.exe 1708 powershell.exe 2168 powershell.exe 948 conhost.exe 1336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
DllCommonsvc.execonhost.execonhost.execonhost.exepowershell.exepowershell.exepowershell.exepowershell.execonhost.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1644 DllCommonsvc.exe Token: SeDebugPrivilege 2412 conhost.exe Token: SeDebugPrivilege 2708 conhost.exe Token: SeDebugPrivilege 2888 conhost.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 1568 powershell.exe Token: SeDebugPrivilege 112 powershell.exe Token: SeDebugPrivilege 328 powershell.exe Token: SeDebugPrivilege 948 conhost.exe Token: SeDebugPrivilege 2120 powershell.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 2168 powershell.exe Token: SeDebugPrivilege 1336 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exeWScript.execmd.exeDllCommonsvc.execmd.execonhost.execmd.execonhost.execmd.exedescription pid process target process PID 1284 wrote to memory of 1348 1284 e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe WScript.exe PID 1284 wrote to memory of 1348 1284 e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe WScript.exe PID 1284 wrote to memory of 1348 1284 e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe WScript.exe PID 1284 wrote to memory of 1348 1284 e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe WScript.exe PID 1348 wrote to memory of 1912 1348 WScript.exe cmd.exe PID 1348 wrote to memory of 1912 1348 WScript.exe cmd.exe PID 1348 wrote to memory of 1912 1348 WScript.exe cmd.exe PID 1348 wrote to memory of 1912 1348 WScript.exe cmd.exe PID 1912 wrote to memory of 1644 1912 cmd.exe DllCommonsvc.exe PID 1912 wrote to memory of 1644 1912 cmd.exe DllCommonsvc.exe PID 1912 wrote to memory of 1644 1912 cmd.exe DllCommonsvc.exe PID 1912 wrote to memory of 1644 1912 cmd.exe DllCommonsvc.exe PID 1644 wrote to memory of 112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1336 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1336 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1336 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1568 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1568 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1568 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2040 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2040 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2040 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 328 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 328 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 328 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1112 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1516 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1516 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1516 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1708 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1708 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 1708 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2120 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2120 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2120 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2168 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2168 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2168 1644 DllCommonsvc.exe powershell.exe PID 1644 wrote to memory of 2292 1644 DllCommonsvc.exe cmd.exe PID 1644 wrote to memory of 2292 1644 DllCommonsvc.exe cmd.exe PID 1644 wrote to memory of 2292 1644 DllCommonsvc.exe cmd.exe PID 2292 wrote to memory of 2392 2292 cmd.exe w32tm.exe PID 2292 wrote to memory of 2392 2292 cmd.exe w32tm.exe PID 2292 wrote to memory of 2392 2292 cmd.exe w32tm.exe PID 2292 wrote to memory of 2412 2292 cmd.exe conhost.exe PID 2292 wrote to memory of 2412 2292 cmd.exe conhost.exe PID 2292 wrote to memory of 2412 2292 cmd.exe conhost.exe PID 2412 wrote to memory of 2624 2412 conhost.exe cmd.exe PID 2412 wrote to memory of 2624 2412 conhost.exe cmd.exe PID 2412 wrote to memory of 2624 2412 conhost.exe cmd.exe PID 2624 wrote to memory of 2676 2624 cmd.exe w32tm.exe PID 2624 wrote to memory of 2676 2624 cmd.exe w32tm.exe PID 2624 wrote to memory of 2676 2624 cmd.exe w32tm.exe PID 2624 wrote to memory of 2708 2624 cmd.exe conhost.exe PID 2624 wrote to memory of 2708 2624 cmd.exe conhost.exe PID 2624 wrote to memory of 2708 2624 cmd.exe conhost.exe PID 2708 wrote to memory of 2832 2708 conhost.exe cmd.exe PID 2708 wrote to memory of 2832 2708 conhost.exe cmd.exe PID 2708 wrote to memory of 2832 2708 conhost.exe cmd.exe PID 2832 wrote to memory of 2872 2832 cmd.exe w32tm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe"C:\Users\Admin\AppData\Local\Temp\e6b6a16d17784fdcb240af7ff962b014d7d61d391a99293c8d2fad5dc2805458.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\providercommon\1zu9dW.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\providercommon\DllCommonsvc.exe"C:\providercommon\DllCommonsvc.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Recent\sppsvc.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Microsoft\Search\Data\Applications\System.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\conhost.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SchCache\services.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\cmd.exe'5⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Internet Explorer\WMIADAP.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\services.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Templates\wininit.exe'5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\K0bbLiBhSW.bat"5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:26⤵
-
C:\providercommon\conhost.exe"C:\providercommon\conhost.exe"6⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6M87tNVNy8.bat"7⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵
-
C:\providercommon\conhost.exe"C:\providercommon\conhost.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s1KW4B7p45.bat"9⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:210⤵
-
C:\providercommon\conhost.exe"C:\providercommon\conhost.exe"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\xAFUrPKKMy.bat"11⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:212⤵
-
C:\providercommon\conhost.exe"C:\providercommon\conhost.exe"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\svsOdT1nlB.bat"13⤵
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:214⤵
-
C:\providercommon\conhost.exe"C:\providercommon\conhost.exe"14⤵
- Executes dropped EXE
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 11 /tr "'C:\Users\Default\Recent\sppsvc.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\Recent\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Recent\sppsvc.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Microsoft\Search\Data\Applications\System.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\All Users\Microsoft\Search\Data\Applications\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Users\All Users\Microsoft\Search\Data\Applications\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Windows\SchCache\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Windows\SchCache\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 10 /tr "'C:\Windows\SchCache\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 7 /tr "'C:\providercommon\conhost.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "conhostc" /sc MINUTE /mo 14 /tr "'C:\providercommon\conhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 11 /tr "'C:\providercommon\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\providercommon\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Internet Explorer\WMIADAP.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAP" /sc ONLOGON /tr "'C:\Program Files (x86)\Internet Explorer\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WMIADAPW" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Internet Explorer\WMIADAP.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 8 /tr "'C:\providercommon\services.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "servicess" /sc MINUTE /mo 12 /tr "'C:\providercommon\services.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Templates\wininit.exe'" /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\Templates\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "wininitw" /sc MINUTE /mo 13 /tr "'C:\Users\All Users\Templates\wininit.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6M87tNVNy8.batFilesize
194B
MD53104c70371c99abc33672c95eaea5035
SHA13e08f10ab2aaa25543ba422f0a8fb958d067a890
SHA25625ba86c2d68c064459c03bd2335a6bf71d7b784175ed00e5ab8ac3c0aeeb2fb7
SHA512420effe4bd8fb7c059c58a0db0f593eab891c93cb6653131d8272ffa12080568e2d94d96f7f184f7533d0dba6ccfbcc5e412fe96ace58b54f1cdfee8ef0436b7
-
C:\Users\Admin\AppData\Local\Temp\K0bbLiBhSW.batFilesize
194B
MD5cb01ecab4093269260e44e1f1f552e71
SHA11e37586bbfc6a3d35ee7ba14bc49cb7700b9ee0c
SHA2564786e5b02a0db0ef9cf343db70f6ac763db17b63c68d488e4f5f464c009f849f
SHA512b448519521b70f4e7d713394f85fa16f38bbe94ff24a7754138aedd1f29e3686de7cf0dabecbe3430e9e61da1e64a32439a7d16d08e5f78f3e93e866d9ea5dbf
-
C:\Users\Admin\AppData\Local\Temp\s1KW4B7p45.batFilesize
194B
MD5bc20b04a92724ab0992dee04d57ba7a1
SHA1cf116e4abfa681823d603607faf9bd3f76979af2
SHA256b86fb885f034788b362444c36baa070b5a500ad54b68b889e014ffd74e781f16
SHA5121c326fe7878503c7f743f151a1538e7796482b1f39d8cc6a816e792fb42ccc445be3649100f8b59bc4b0f34a9e1a10d144cbffed6db116889acf3d63b3f55b66
-
C:\Users\Admin\AppData\Local\Temp\svsOdT1nlB.batFilesize
194B
MD5bfa76bee91947bbf04a904ce56518ff3
SHA1404a67061b579be7dbcbe797bf4b03c35666e08f
SHA256ed8c556b5406574dabbafd936f915a1707fbe376e05864689b7647e459dcde29
SHA512b5842fb0f386466412462d64ae513c578799883fb1aec90a6d203d550f57aa814126d0e11e9ca906e07c2a36fbf0e69d4d1762aeded97f4cd23185d7eb587f8c
-
C:\Users\Admin\AppData\Local\Temp\xAFUrPKKMy.batFilesize
194B
MD546016a17e9f52b98994629534102b2f3
SHA1ae95460fa5128dce3886306b9f87823e2c0a9797
SHA256712460f407aceb05ecf106f857c32f003319b1fd6a9cac2b8defebc74dafaac9
SHA5127737442c987122f41140b15049684c4096f34a7723ea0d9cae41cd8af0e2c4f85a649820bb25e5ecea2930fd97dfb4a7bb93d37d940882503dec8487d609be71
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5026abdadf2e2c8b8c84eac948faf3371
SHA123a33e44e773607d68455d8e3690d21986d0884c
SHA256cdea860e27345f4af6184f8dac22a9eccd7c412577c6b557b761cd5c79d41557
SHA51275449c00b05313b6c3eb7214d9327ae50b3b4d1ffcddcda0a9714dfc712d08d7267cb5aa44f3cbad7cd06986194091eda0300595bf5f09e84457856f06de210e
-
C:\providercommon\1zu9dW.batFilesize
36B
MD56783c3ee07c7d151ceac57f1f9c8bed7
SHA117468f98f95bf504cc1f83c49e49a78526b3ea03
SHA2568ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322
SHA512c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\conhost.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbeFilesize
197B
MD58088241160261560a02c84025d107592
SHA1083121f7027557570994c9fc211df61730455bb5
SHA2562072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1
SHA51220d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478
-
\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
\providercommon\DllCommonsvc.exeFilesize
1.0MB
MD5bd31e94b4143c4ce49c17d3af46bcad0
SHA1f8c51ff3ff909531d9469d4ba1bbabae101853ff
SHA256b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63
SHA512f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394
-
memory/112-70-0x0000000000000000-mapping.dmp
-
memory/112-166-0x000000000292B000-0x000000000294A000-memory.dmpFilesize
124KB
-
memory/112-162-0x0000000002924000-0x0000000002927000-memory.dmpFilesize
12KB
-
memory/112-124-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/112-145-0x000000001B880000-0x000000001BB7F000-memory.dmpFilesize
3.0MB
-
memory/112-130-0x0000000002924000-0x0000000002927000-memory.dmpFilesize
12KB
-
memory/112-83-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/304-139-0x0000000000000000-mapping.dmp
-
memory/328-164-0x000000000289B000-0x00000000028BA000-memory.dmpFilesize
124KB
-
memory/328-107-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/328-74-0x0000000000000000-mapping.dmp
-
memory/328-160-0x0000000002894000-0x0000000002897000-memory.dmpFilesize
12KB
-
memory/328-123-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/328-129-0x0000000002894000-0x0000000002897000-memory.dmpFilesize
12KB
-
memory/688-178-0x0000000000000000-mapping.dmp
-
memory/688-180-0x00000000008E0000-0x00000000009F0000-memory.dmpFilesize
1.1MB
-
memory/948-144-0x0000000000030000-0x0000000000140000-memory.dmpFilesize
1.1MB
-
memory/948-142-0x0000000000000000-mapping.dmp
-
memory/952-176-0x0000000000000000-mapping.dmp
-
memory/1112-75-0x0000000000000000-mapping.dmp
-
memory/1112-110-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/1112-158-0x00000000026B4000-0x00000000026B7000-memory.dmpFilesize
12KB
-
memory/1112-132-0x00000000026B4000-0x00000000026B7000-memory.dmpFilesize
12KB
-
memory/1112-163-0x00000000026BB000-0x00000000026DA000-memory.dmpFilesize
124KB
-
memory/1112-151-0x000000001B780000-0x000000001BA7F000-memory.dmpFilesize
3.0MB
-
memory/1112-126-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/1284-54-0x0000000075F01000-0x0000000075F03000-memory.dmpFilesize
8KB
-
memory/1336-71-0x0000000000000000-mapping.dmp
-
memory/1336-159-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/1336-169-0x00000000028D4000-0x00000000028D7000-memory.dmpFilesize
12KB
-
memory/1336-170-0x000000001B7D0000-0x000000001BACF000-memory.dmpFilesize
3.0MB
-
memory/1336-171-0x00000000028DB000-0x00000000028FA000-memory.dmpFilesize
124KB
-
memory/1336-173-0x00000000028DB000-0x00000000028FA000-memory.dmpFilesize
124KB
-
memory/1336-172-0x00000000028D4000-0x00000000028D7000-memory.dmpFilesize
12KB
-
memory/1336-157-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/1336-76-0x000007FEFBE41000-0x000007FEFBE43000-memory.dmpFilesize
8KB
-
memory/1348-55-0x0000000000000000-mapping.dmp
-
memory/1516-79-0x0000000000000000-mapping.dmp
-
memory/1568-150-0x0000000002344000-0x0000000002347000-memory.dmpFilesize
12KB
-
memory/1568-177-0x000000000234B000-0x000000000236A000-memory.dmpFilesize
124KB
-
memory/1568-135-0x0000000002344000-0x0000000002347000-memory.dmpFilesize
12KB
-
memory/1568-72-0x0000000000000000-mapping.dmp
-
memory/1568-85-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/1568-149-0x000000000234B000-0x000000000236A000-memory.dmpFilesize
124KB
-
memory/1568-140-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/1644-65-0x0000000000D20000-0x0000000000E30000-memory.dmpFilesize
1.1MB
-
memory/1644-68-0x00000000002D0000-0x00000000002DC000-memory.dmpFilesize
48KB
-
memory/1644-63-0x0000000000000000-mapping.dmp
-
memory/1644-69-0x00000000002E0000-0x00000000002EC000-memory.dmpFilesize
48KB
-
memory/1644-66-0x00000000002C0000-0x00000000002D2000-memory.dmpFilesize
72KB
-
memory/1644-67-0x00000000002F0000-0x00000000002FC000-memory.dmpFilesize
48KB
-
memory/1708-127-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/1708-133-0x0000000002654000-0x0000000002657000-memory.dmpFilesize
12KB
-
memory/1708-161-0x0000000002654000-0x0000000002657000-memory.dmpFilesize
12KB
-
memory/1708-156-0x000000001B700000-0x000000001B9FF000-memory.dmpFilesize
3.0MB
-
memory/1708-109-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/1708-82-0x0000000000000000-mapping.dmp
-
memory/1708-165-0x000000000265B000-0x000000000267A000-memory.dmpFilesize
124KB
-
memory/1912-59-0x0000000000000000-mapping.dmp
-
memory/2040-148-0x00000000028CB000-0x00000000028EA000-memory.dmpFilesize
124KB
-
memory/2040-147-0x00000000028C4000-0x00000000028C7000-memory.dmpFilesize
12KB
-
memory/2040-146-0x00000000028CB000-0x00000000028EA000-memory.dmpFilesize
124KB
-
memory/2040-106-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/2040-73-0x0000000000000000-mapping.dmp
-
memory/2040-141-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/2040-136-0x00000000028C4000-0x00000000028C7000-memory.dmpFilesize
12KB
-
memory/2120-152-0x000000000272B000-0x000000000274A000-memory.dmpFilesize
124KB
-
memory/2120-131-0x0000000002724000-0x0000000002727000-memory.dmpFilesize
12KB
-
memory/2120-153-0x0000000002724000-0x0000000002727000-memory.dmpFilesize
12KB
-
memory/2120-125-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/2120-87-0x0000000000000000-mapping.dmp
-
memory/2120-111-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/2168-167-0x00000000026B4000-0x00000000026B7000-memory.dmpFilesize
12KB
-
memory/2168-154-0x000000001B7E0000-0x000000001BADF000-memory.dmpFilesize
3.0MB
-
memory/2168-108-0x000007FEEC330000-0x000007FEECD53000-memory.dmpFilesize
10.1MB
-
memory/2168-128-0x000007FEE90A0000-0x000007FEE9BFD000-memory.dmpFilesize
11.4MB
-
memory/2168-90-0x0000000000000000-mapping.dmp
-
memory/2168-134-0x00000000026B4000-0x00000000026B7000-memory.dmpFilesize
12KB
-
memory/2168-168-0x00000000026BB000-0x00000000026DA000-memory.dmpFilesize
124KB
-
memory/2292-97-0x0000000000000000-mapping.dmp
-
memory/2392-101-0x0000000000000000-mapping.dmp
-
memory/2396-174-0x0000000000000000-mapping.dmp
-
memory/2412-105-0x00000000011C0000-0x00000000012D0000-memory.dmpFilesize
1.1MB
-
memory/2412-103-0x0000000000000000-mapping.dmp
-
memory/2624-112-0x0000000000000000-mapping.dmp
-
memory/2676-114-0x0000000000000000-mapping.dmp
-
memory/2708-117-0x00000000002D0000-0x00000000002E2000-memory.dmpFilesize
72KB
-
memory/2708-115-0x0000000000000000-mapping.dmp
-
memory/2832-118-0x0000000000000000-mapping.dmp
-
memory/2872-120-0x0000000000000000-mapping.dmp
-
memory/2888-121-0x0000000000000000-mapping.dmp
-
memory/3048-137-0x0000000000000000-mapping.dmp