Malware Analysis Report

2025-01-03 08:19

Sample ID 240705-kazkaavfmr
Target 26c967c0ba12ac44b19a102e6fac61cd_JaffaCakes118
SHA256 1c8498ba8e223000d090fc11adb6d3e3241a277de0af7f189d30b7b1d3cb09f9
Tags
metasploit backdoor trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

1c8498ba8e223000d090fc11adb6d3e3241a277de0af7f189d30b7b1d3cb09f9

Threat Level: Known bad

The file 26c967c0ba12ac44b19a102e6fac61cd_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

metasploit backdoor trojan upx

MetaSploit

UPX packed file

Checks computer location settings

Deletes itself

Loads dropped DLL

Executes dropped EXE

Maps connected drives based on registry

Drops file in System32 directory

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Modifies registry class

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-05 08:24

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-05 08:24

Reported

2024-07-05 08:38

Platform

win7-20240221-en

Max time kernel

149s

Max time network

120s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2892 set thread context of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2648 set thread context of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 set thread context of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 set thread context of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 set thread context of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 set thread context of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1780 set thread context of 776 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 348 set thread context of 2116 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1404 set thread context of 684 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2304 set thread context of 1944 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2888 set thread context of 2052 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2448 set thread context of 2724 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2688 set thread context of 2744 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1860 set thread context of 1948 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 set thread context of 1848 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2124 set thread context of 2252 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1552 set thread context of 2076 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2924 set thread context of 1392 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2892 wrote to memory of 2972 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 2972 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2972 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2972 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2972 wrote to memory of 2648 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2648 wrote to memory of 2536 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2536 wrote to memory of 2180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2536 wrote to memory of 2180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2536 wrote to memory of 2180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2536 wrote to memory of 2180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2180 wrote to memory of 2164 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2164 wrote to memory of 2936 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2164 wrote to memory of 2936 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2164 wrote to memory of 2936 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2164 wrote to memory of 2936 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2936 wrote to memory of 352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 352 wrote to memory of 1224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 352 wrote to memory of 1224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 352 wrote to memory of 1224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 352 wrote to memory of 1224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1224 wrote to memory of 2400 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2400 wrote to memory of 2224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2400 wrote to memory of 2224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2400 wrote to memory of 2224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2400 wrote to memory of 2224 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2224 wrote to memory of 2084 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2084 wrote to memory of 1780 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2084 wrote to memory of 1780 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

Network

N/A

Files

memory/2972-4-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-3-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-2-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-0-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-7-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-6-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-9-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-8-0x0000000000400000-0x0000000000458000-memory.dmp

\Windows\SysWOW64\wmphtc32.exe

MD5 5ac3b1e5dbe9f4bcc7e91e5273b62f69
SHA1 a8aa38fd102891576ec1b1cc2a8de61e2091a725
SHA256 4f4b1473a5f7a50f428f4c59c1d0e53907873252b035e7cb222a548f334040a0
SHA512 7077e2a91db7e91d4e97488ba02e73b416a39691d246803c1ef583b35c8843ed6e0a5838af46480e0fbbc823152aee32dd119cf68322975492070e6118caadcd

memory/2536-35-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2972-38-0x0000000000400000-0x0000000000458000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2164-56-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2536-55-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2536-57-0x0000000000400000-0x0000000000458000-memory.dmp

memory/352-74-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2164-75-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2400-92-0x0000000000400000-0x0000000000458000-memory.dmp

memory/352-93-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2084-111-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2400-114-0x0000000000400000-0x0000000000458000-memory.dmp

memory/776-130-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2084-133-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2116-149-0x0000000000400000-0x0000000000458000-memory.dmp

memory/776-152-0x0000000000400000-0x0000000000458000-memory.dmp

memory/684-169-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2116-172-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1944-188-0x0000000000400000-0x0000000000458000-memory.dmp

memory/684-191-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2052-205-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1944-208-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2724-218-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2052-221-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2744-231-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2724-234-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1948-244-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2744-247-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1848-257-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1948-260-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2252-270-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1848-273-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2252-276-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2076-286-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1392-296-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2076-299-0x0000000000400000-0x0000000000458000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-05 08:24

Reported

2024-07-05 08:39

Platform

win10v2004-20240704-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

Signatures

MetaSploit

trojan backdoor metasploit

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-2547232018-1419253926-3356748848-1000\Control Panel\International\Geo\Nation C:\Windows\SysWOW64\wmphtc32.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Windows\SysWOW64\wmphtc32.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Windows\SysWOW64\wmphtc32.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A
File created C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe N/A
File opened for modification C:\Windows\SysWOW64\ C:\Windows\SysWOW64\wmphtc32.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 6028 set thread context of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 3248 set thread context of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 set thread context of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 set thread context of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 set thread context of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 set thread context of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 6132 set thread context of 5568 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3304 set thread context of 4376 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2060 set thread context of 5732 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 772 set thread context of 5296 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5696 set thread context of 5192 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 456 set thread context of 5988 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4744 set thread context of 5440 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4752 set thread context of 5776 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5768 set thread context of 2868 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4480 set thread context of 3712 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Windows\SysWOW64\wmphtc32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A
N/A N/A C:\Windows\SysWOW64\wmphtc32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 6028 wrote to memory of 5668 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe
PID 5668 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5668 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5668 wrote to memory of 3248 N/A C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3248 wrote to memory of 1308 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1308 wrote to memory of 4604 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1308 wrote to memory of 4604 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1308 wrote to memory of 4604 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4604 wrote to memory of 2000 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2000 wrote to memory of 1104 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2000 wrote to memory of 1104 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 2000 wrote to memory of 1104 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1104 wrote to memory of 4176 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4176 wrote to memory of 3180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4176 wrote to memory of 3180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4176 wrote to memory of 3180 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 3180 wrote to memory of 5924 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5924 wrote to memory of 1748 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5924 wrote to memory of 1748 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 5924 wrote to memory of 1748 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 1748 wrote to memory of 4352 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4352 wrote to memory of 6132 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4352 wrote to memory of 6132 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 4352 wrote to memory of 6132 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 6132 wrote to memory of 5568 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 6132 wrote to memory of 5568 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 6132 wrote to memory of 5568 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe
PID 6132 wrote to memory of 5568 N/A C:\Windows\SysWOW64\wmphtc32.exe C:\Windows\SysWOW64\wmphtc32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe

"C:\Users\Admin\AppData\Local\Temp\Picture65.JPG_www.facebook.exe"

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Users\Admin\AppData\Local\Temp\PICTUR~1.EXE

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

C:\Windows\SysWOW64\wmphtc32.exe

"C:\Windows\system32\wmphtc32.exe" C:\Windows\SysWOW64\wmphtc32.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp

Files

memory/5668-0-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5668-2-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5668-3-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5668-4-0x0000000000400000-0x0000000000458000-memory.dmp

C:\Windows\SysWOW64\wmphtc32.exe

MD5 5ac3b1e5dbe9f4bcc7e91e5273b62f69
SHA1 a8aa38fd102891576ec1b1cc2a8de61e2091a725
SHA256 4f4b1473a5f7a50f428f4c59c1d0e53907873252b035e7cb222a548f334040a0
SHA512 7077e2a91db7e91d4e97488ba02e73b416a39691d246803c1ef583b35c8843ed6e0a5838af46480e0fbbc823152aee32dd119cf68322975492070e6118caadcd

memory/1308-43-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5668-44-0x0000000000400000-0x0000000000458000-memory.dmp

memory/1308-49-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2000-52-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2000-53-0x0000000000400000-0x0000000000458000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4176-60-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2000-61-0x0000000000400000-0x0000000000458000-memory.dmp

memory/4176-68-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5924-76-0x0000000000400000-0x0000000000458000-memory.dmp

memory/4352-81-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5568-89-0x0000000000400000-0x0000000000458000-memory.dmp

memory/4376-94-0x0000000000400000-0x0000000000458000-memory.dmp

memory/4376-101-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5732-106-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5296-118-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5192-124-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5988-126-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5440-135-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5988-131-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5440-145-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2868-151-0x0000000000400000-0x0000000000458000-memory.dmp

memory/5776-154-0x0000000000400000-0x0000000000458000-memory.dmp

memory/2868-161-0x0000000000400000-0x0000000000458000-memory.dmp