Analysis
-
max time kernel
150s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
30-06-2024 18:35
Static task
static1
Behavioral task
behavioral1
Sample
1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe
Resource
win7-20240611-en
General
-
Target
1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe
-
Size
938KB
-
MD5
4e4010befd36c75466ee97219d47b261
-
SHA1
9dc92bcdf210ba38ad6c6a84f3993043f2fc983c
-
SHA256
1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594
-
SHA512
7453ef520a0af5e51975d063daf5b65e8d7c8432b36aeca5d5380ad8345741bbf42291b0c5d3a4b17cf9b416b246691bfada5fb3a6840b1a78187c3bff3455cf
-
SSDEEP
12288:47+G+rcR2BWcjL1JLs4Y6CRdz69HiJENgz5QDA6dVxawwMScxn/32XOG1T:47dRK85ro5RVxRScBf2XO0
Malware Config
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2556 cmd.exe -
Executes dropped EXE 4 IoCs
Processes:
Logo1_.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exeDesktopLayer.exepid process 1844 Logo1_.exe 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe 2576 DesktopLayer.exe -
Loads dropped DLL 4 IoCs
Processes:
cmd.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exepid process 2556 cmd.exe 2556 cmd.exe 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe upx behavioral1/memory/2500-41-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2576-54-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2576-51-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Logo1_.exedescription ioc process File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Logo1_.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exedescription ioc process File created C:\Program Files\DVD Maker\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_zh_4.4.0.v20140623020002\_desktop.ini Logo1_.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.5\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\CSharp\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Bibliography\Style\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Indian\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre7\bin\servertool.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\Basic\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Library\Analysis\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\px75BC.tmp 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe File created C:\Program Files\VideoLAN\VLC\locale\cgg\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SKY\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\CLIPART\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\ink\fr-FR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CONCRETE\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1036\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\fr-FR\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ko\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\css\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\js\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1040\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveProjectToolset\ProjectTool\Project Report Type\_desktop.ini Logo1_.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\images\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Minesweeper\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\brx\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Games\Chess\ja-JP\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ug\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\skins\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\css\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\AddInSideAdapters\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\fr-FR\css\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
Processes:
1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exeLogo1_.exedescription ioc process File created C:\Windows\rundl132.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe File created C:\Windows\Logo1_.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe File opened for modification C:\Windows\rundl132.exe Logo1_.exe File created C:\Windows\vDll.dll Logo1_.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "425934389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{81BD61A1-370F-11EF-8A4F-62EADBC3072C} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
Logo1_.exeDesktopLayer.exepid process 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe 2576 DesktopLayer.exe 2576 DesktopLayer.exe 2576 DesktopLayer.exe 2576 DesktopLayer.exe 1844 Logo1_.exe 1844 Logo1_.exe 1844 Logo1_.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2540 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2540 iexplore.exe 2540 iexplore.exe 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE 3016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exeLogo1_.exenet.execmd.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 2208 wrote to memory of 2556 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe cmd.exe PID 2208 wrote to memory of 2556 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe cmd.exe PID 2208 wrote to memory of 2556 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe cmd.exe PID 2208 wrote to memory of 2556 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe cmd.exe PID 2208 wrote to memory of 1844 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe Logo1_.exe PID 2208 wrote to memory of 1844 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe Logo1_.exe PID 2208 wrote to memory of 1844 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe Logo1_.exe PID 2208 wrote to memory of 1844 2208 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe Logo1_.exe PID 1844 wrote to memory of 2700 1844 Logo1_.exe net.exe PID 1844 wrote to memory of 2700 1844 Logo1_.exe net.exe PID 1844 wrote to memory of 2700 1844 Logo1_.exe net.exe PID 1844 wrote to memory of 2700 1844 Logo1_.exe net.exe PID 2700 wrote to memory of 2656 2700 net.exe net1.exe PID 2700 wrote to memory of 2656 2700 net.exe net1.exe PID 2700 wrote to memory of 2656 2700 net.exe net1.exe PID 2700 wrote to memory of 2656 2700 net.exe net1.exe PID 2556 wrote to memory of 1352 2556 cmd.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe PID 2556 wrote to memory of 1352 2556 cmd.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe PID 2556 wrote to memory of 1352 2556 cmd.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe PID 2556 wrote to memory of 1352 2556 cmd.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe PID 1352 wrote to memory of 2500 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe PID 1352 wrote to memory of 2500 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe PID 1352 wrote to memory of 2500 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe PID 1352 wrote to memory of 2500 1352 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe PID 2500 wrote to memory of 2576 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe DesktopLayer.exe PID 2500 wrote to memory of 2576 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe DesktopLayer.exe PID 2500 wrote to memory of 2576 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe DesktopLayer.exe PID 2500 wrote to memory of 2576 2500 1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe DesktopLayer.exe PID 2576 wrote to memory of 2540 2576 DesktopLayer.exe iexplore.exe PID 2576 wrote to memory of 2540 2576 DesktopLayer.exe iexplore.exe PID 2576 wrote to memory of 2540 2576 DesktopLayer.exe iexplore.exe PID 2576 wrote to memory of 2540 2576 DesktopLayer.exe iexplore.exe PID 2540 wrote to memory of 3016 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 3016 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 3016 2540 iexplore.exe IEXPLORE.EXE PID 2540 wrote to memory of 3016 2540 iexplore.exe IEXPLORE.EXE PID 1844 wrote to memory of 2540 1844 Logo1_.exe iexplore.exe PID 1844 wrote to memory of 2540 1844 Logo1_.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe"C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a7281.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe"C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exeC:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2540 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exeFilesize
251KB
MD5f5247d45580bc4137b32f751f887f3f4
SHA13b8b82943eefd9603d3d57cb1e9f77eb10bbf80b
SHA25661091ef66c02b73d45c58c86aa58f67e2d1ce65536f0f16c8367b3444363a090
SHA5125c8177a1359aa4de8695a99a3f916250ab7c6f5c0aa2ad8beb157d4ff58276380514a8b16dab42c04a203333a90d3e90dda9785faae9dff701eb0bd8fffaa439
-
C:\ProgramData\Package Cache\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\vcredist_x64.exeFilesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD512993832ff6b469c009d0cdf439a8db7
SHA185172ae2d7e57259ae30ea9da45ddd9244ab7b17
SHA2567ba1a72076b19a4a5574da9b3728a66a0387de60b0dae115228de234e6021de6
SHA512cda18fca87d782dad1a5732a7aac957bbb2db3fcacd18b07de0dd4d942c7bf9a0825c45b0370075173f5ef2d2409fea3be3475ed078701e1eaf287ae23ec7d7c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD52e7dcbeb7461dd5dc6c0fa975076fbe1
SHA161acc00470c87f650999f88cd7e9f927486ad638
SHA256403c2d96c914376662c2ac873e5a9f4c4025e6666ed612de0af6a2a13ee772d5
SHA51221e19fa4826f3055882457c34f0c31a54cadf313be7c0c537379beda4f850da49cf07eca6086047f22418f811b8abb5353aaa9cd27d12296005a72967a22997f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD51febb87c5d84bfbf636b301681df95e4
SHA18ca30085fd96688907795d6de68cbec07933a356
SHA256b1dde283624697812d3da9507f9b2a90d34da94ac08d347a8be3e6595ab7a772
SHA5127c24ff09c263aa794cda94e24b2869c57d076387710bc3eb9140c60d501389ac104309f288c9c100cdefac67cacd3d99b43830786cd47482a5ae20030593e34d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f67d815f308af710aede1cad44f7b40b
SHA153ebfb012089a452781554e7c113f72645e70b76
SHA25619c2395e9bee1d05ac9a1aed6650710ca886b74bf57ca71045ef583c864656b5
SHA5125936c749f1d4d1b0b9aaa2aaf8631548cc11ad47c8eae3a6b92ac25e6197c6b8e13784fab6f6a9cb0c4350e34a884dd4833404ca8e60b1b2dac9a71f7bf212a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5830774c625487ea1318f185afddc61e9
SHA161a20bba86524e932d248e7d5a5671b35942e2a7
SHA256ee5d1d350aff2e68ba498e407abb2d0a9a9434ff7c32aec8bde3bf9a5ba73890
SHA512752ec15f549570bb6ec38b42b721360d59fb3cb1088aea29f750c1f4c72e0ba47e61c9007e21c260a963dd9df1017971f4d0bc730e4eea7860bf048f9ae144dc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5aeb57dcd4466de05deb51378df271beb
SHA1595afca5d5216888deeb235620978d26562576ba
SHA256b8f9530141f6cf106c9c8bae894146fb171e51d39bdeb253c708ebeb8269d828
SHA5128fb0698eaa8c7de059ab26ce9d9c928bb68668251b9726c53ee32f408d363511a7cf835149324b8f050555f82b13b7a658aeb9a5107523a56d1180c49e196ad6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5c93e8101b64148b0beeba16acd2240a3
SHA1c25f93a72c4f1c20ff13b2479ff3e834588bf1c2
SHA256d7c6e1f247be13e0df32bb26e2f11d1b251e31bf63c3cf486a44043b9624b6bd
SHA512d8ed1c65506b61ffb257bb77f165ce90c2aa48e6ee6cd1bbd9a74ac36ebc3e3ef22d3bfbec24ec8a8c8f94a6573297a710f15ce3c4d29931c66059e55eb813a0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD57ac2c547b22da8650f3aab25cb6d97e2
SHA1024a66b9e9b20117e822e19d1c133f34ab2caab3
SHA256b8cbc2dd0754747ed921a31489505a074c5556be483d2bdaca4456a64a16d096
SHA5127fe211bfc41601d309868e763c0eb62514caf10fe529826fe729a61cb6e1366611d08bc51d2ded05652f9ddb7bc74ab0d5f0bcf39ec84f256b6f02e950cd9843
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58cf6b289750928cec77530355e01e25b
SHA1eebc22baba9b26bee1ec79cfbf482682dc6638df
SHA2566d3fa6c00f2642ec913e89e453470b42ee49f11cfffcecd36c76a63a7c74d9ee
SHA51299b5007a7ce6142c5724fe9460e4005d365c0fe3811f1f3f29ca3fad1c1d2b6d96170cbe22de06aa9686ffddbc7fd6b1fad8d20c6d011b5023b1cde9d49f0dee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5e3ff63490d4ed7e81b019be0aeddc9ce
SHA1c58d0ea2a5396f1de4ada94d1ef823254866e99c
SHA2565973dee8390da883e507935b8117c0bfbbbbde60b72d2c3c73b18b325b42994a
SHA512c760d5096430780f6c1077b014a14d10172b8b568b9b2fa808c6e1f85fd784608d459f2403391a20141d42aa94651f04b56b542d653caae6c0452e2025c9f078
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5a8b630fed4a9d71d5adba8078ae17167
SHA1981f2147f82be1b0ea0c8d8709cb31c9bff79371
SHA2564e3ea1921bacdf4be206418f66c4b3d81eeb00623c06aa9482ba34fb08a4a9da
SHA5122fb179fd48bd6d0b5044f03c1f554c2ca2ec2ae1117a0e8d09ac680d61d3a568478280764c78757bfaa65a55d51c4b4db94445e8b59d74ecd3abfb18c4575af5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD566fec3d1f4433397e74bbf73f97ae6ae
SHA106bd748921f16cc0fda180c833c291488077f479
SHA25644dce845ae5b55c6c324b7df490edb47866ce44102d8c3149c6eaaaedbf5965f
SHA5127a64fad0129d320716bc4d5ac5b84ef2f4e89775f1c15baa1fd1f838c5cbbd17922af741db2b9fa59e19da9cf5e2bda9fbe62cc7f6ba4bed6c8c9717f96c7144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55824bad9433769ff52d5dd58d73e66da
SHA1553e66cb9b0f941272537ea7395233d1d56faa18
SHA2567b73ed772c03556485b59e0477f91d479e0a2eaf1dad5c05729c1f40c4e9312d
SHA512989665050251626d6db5230eed7d36890752bfc0d9b5320518539a66fcaf9d2db03e9d52388a9efa0d967d91c2ca7110fe60230703d7d741260a7a12c8388292
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5ea701ebe2565e37fd27b1f3d6359bed8
SHA196bf23fcfc7548c62a4d6247f6c17288519e3bef
SHA2569fc901c34ead42ac925e94d4e1ad73c7310313c63ff86f6ba89e1d70c9bbd6cd
SHA512a39a81700c983ba13cb324ec7a5409db35a8e66792e2a9fb52ecab7b1c5de759c922f5f632bd159076464ace16e48ba08eaadd1f05f4aeafdbee053da9697cf6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5f27ad6c732b81a8403b871f6400c52e2
SHA1b02bb14a81ca196ce55d423efb91b8831a890dbc
SHA256939ed0e77b2df393a99605f2d854f0bb78137dbdbd86dc1a73a2f68621bc95b4
SHA512a2e2e3a964c901f07c7c8714d927237411b09e1989d41ddae9938c3686a983a93088b2cf562a2ade560893365953d6a0d1fa932cd84275624dbe29c1f05e35b7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5128121040753862626fa9fabf05ae30e
SHA180f0907235dc624628ccd67cddd9a8e70cf43ecb
SHA256f34d1803f3d826de8c5176c2e477491386e7d58c2daf3deaa6436051a6829921
SHA512156ad1495826735e1a1e64748de9be60441ca63c3868d16d8df01b974fe4e2209e2ecc3bb2558ea36dcfd15062030cd065e008cadceb54057dc4e7a4c590b7d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58604fc7d5550490ae261ec5b03f8038a
SHA1007fb6b5417b625b13a4f57af2a9d1891e69a5be
SHA2564cf71a502d0b456202f6a84a22a403e868dd297c5fd074c55f648a6163151669
SHA51285824c06593a4f7cc602d2dcea307cd557145c6cb101c0878645178400b28a527add79c1dc316a14c634b167bac5333888ad2ac67178d2b7891fccf0a01eeec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5444dcdd5688f311492194429e3446b4d
SHA12818200657383fd584caf788f82cfcef53a1c107
SHA256ea3ced5a4791f5550d8b2b784d44750f7377a0f2f01fb5df5d222e6aacabab2a
SHA512bacb9ccb47cef11e3d5d68ebce13a1b5c6f1f25d7294bba9b1c9b7e1484734ed1d02e73a6b1d7dc4c13b399b5b08fa23ffaf24cd19bbd3e4087f5330f1f29dfb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD58d23c53015a6c97d6963611a1dd009f9
SHA144f150b1716a17f6472d4f082258a8b0b5367b36
SHA256e4c53de25f88eda347334583e2a0472bdde986fc377e63fc4970a8e2a2f20ed6
SHA512e08551bf591f8af42dc10a2bae2206d0e05e2607c1811bdf6063dc94b55b205ebac0fce9671e685c8867a00f3c28f5c4ad69c780adb680dba8fc02cf203a8caa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD523b130017af44ebf91f421b68f9a3505
SHA12a0b9b375d9da85366c55be91adbe23a4cd010b8
SHA25644d08b5d7f6161ab9d0371f4cfe59dbf8eb2eb0484c318b7acd7c20cfd5e775b
SHA51233d7c9394599653b1ea2f9b4b39542ff7c61cb23cca38433a6fa6f473bb3f37b14377ef76fcb645fc3035477a5e17999a653299b180326c9f5f808520614f03f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD55d0a16f7129021d916562db3b995adbc
SHA150bdb042f8ba685e2c0f67fd3eb0e67fb15b0ace
SHA256c7f6fa97050742dc08564c52c4689eae0274ebf2698ba1f5cc772e6d3a9f7359
SHA5120afe77ff423fac1a6aafcfaa5b06c56834dbedaf0209f880a2a6b2b59278b2f85b6a61f0375a7c6e1df78d6287af7aff4e9cdca9d539a9380b731cc28dcc071f
-
C:\Users\Admin\AppData\Local\Temp\$$a7281.batFilesize
722B
MD5fb03392b82f6d4591c886f958ac8cc32
SHA1647d2e49b53744e06d0c354596123a9c236ac145
SHA256f9dfde4cd6702e69310cecf3d9ef4b6a83e9f8ed67743652d6ca0eca29e81fb6
SHA51288b402f6d906091120fff07c05543af323160e90bcf17f74a70e724fd6b7aee480fcdac82772883d921d8467bc94270a1e4ac85cc4f06faa1a5501525fd43614
-
C:\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594.exe.exeFilesize
912KB
MD50e1effe0649461a726e982331b7610fb
SHA1ed6b696cb612b63023e0be47d3152947f405131a
SHA256922470b85ceb399574cb39b46ccbc29d9411b0295737dc33ff7696276d945f89
SHA512945c35a8f7aa11e4868e0e6b604ea85c180f44628e3f86bcfe98837f88dfb1542632acb1beeeb8e6a922b798acc7263cc93a518671706c9f69b8439b432d3b78
-
C:\Users\Admin\AppData\Local\Temp\Cab9051.tmpFilesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\Local\Temp\Tar9083.tmpFilesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
C:\Windows\Logo1_.exeFilesize
26KB
MD5d4a56b92f2e1da019853a277e11da2cb
SHA1be894cfdf5bc6ea23803f7419a2f8084edd0857a
SHA256f955150f9007ef96564fb2be164758007f615ba64a05ebc3a30f5cffdab6c6f3
SHA512223edbeca71aaab78410175fa216815fbb79d686cd49e1e76f8feb3d248a5b0e18cd951cf41f55a9fb21773bd887c699bcee5d13dee14a104ace95bde801254d
-
F:\$RECYCLE.BIN\S-1-5-21-39690363-730359138-1046745555-1000\_desktop.iniFilesize
9B
MD54b66be111b497cdd28c15afccbbd2620
SHA143ffb36014883f201e76464ded7ec69f2973d43b
SHA256483e991549f8cb58e18e7a79a14cf6065e121f897e73b6f4edff227432a733dc
SHA51232fddfbca04f67fdb0e865862e6f29b06cd079ddba416d801ceedcba8ed88b8dda77663fc8bd5bdd0224f722cd337c9d58edfc2e97e4fab73fa56f6f6198bb21
-
\Users\Admin\AppData\Local\Temp\1204fcc6df6642257959c441fdfd562907b7135ebfe3dfaa8441e8f372376594Srv.exeFilesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
memory/1352-489-0x0000000000230000-0x000000000025E000-memory.dmpFilesize
184KB
-
memory/1352-33-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/1352-43-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/1352-37-0x0000000000230000-0x000000000025E000-memory.dmpFilesize
184KB
-
memory/1352-488-0x0000000000400000-0x00000000004EE000-memory.dmpFilesize
952KB
-
memory/1844-116-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-992-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-496-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-504-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-552-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-4237-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-2772-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-1598-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/1844-20-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2208-17-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2208-0-0x0000000000400000-0x0000000000434000-memory.dmpFilesize
208KB
-
memory/2208-18-0x00000000001B0000-0x00000000001E4000-memory.dmpFilesize
208KB
-
memory/2208-16-0x00000000001B0000-0x00000000001E4000-memory.dmpFilesize
208KB
-
memory/2500-41-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2500-47-0x0000000000240000-0x000000000026E000-memory.dmpFilesize
184KB
-
memory/2500-42-0x0000000000230000-0x000000000023F000-memory.dmpFilesize
60KB
-
memory/2556-32-0x0000000001FA0000-0x000000000208E000-memory.dmpFilesize
952KB
-
memory/2556-29-0x0000000001FA0000-0x000000000208E000-memory.dmpFilesize
952KB
-
memory/2576-51-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2576-54-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/2576-53-0x00000000002C0000-0x00000000002C1000-memory.dmpFilesize
4KB