Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2023 11:22
Behavioral task
behavioral1
Sample
0x0009000000012317-1077.exe
Resource
win7-20230220-en
General
-
Target
0x0009000000012317-1077.exe
-
Size
235KB
-
MD5
45a52c031a49cfc0ce7d83cf85c9810a
-
SHA1
d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
-
SHA256
bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
-
SHA512
7fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
SSDEEP
6144:P5gzTsHKSwe4FTbiC5YGL2zuVicJBgrJm:x6xTbKGmuViWg
Malware Config
Extracted
amadey
3.68
62.204.41.59/wordpress/console2/index.php
Extracted
aurora
45.15.156.172:8081
Extracted
redline
mango
193.233.20.28:4125
-
auth_value
ecf79d7f5227d998a3501c972d915d23
Extracted
redline
ruka
193.233.20.28:4125
-
auth_value
5d1d0e51ebe1e3f16cca573ff651c43c
Signatures
-
Processes:
f8281wD.exeg83eH44.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f8281wD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f8281wD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g83eH44.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f8281wD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f8281wD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f8281wD.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f8281wD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g83eH44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g83eH44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g83eH44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g83eH44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g83eH44.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/1096-330-0x0000000007210000-0x000000000724E000-memory.dmp family_redline behavioral2/memory/1096-331-0x0000000007210000-0x000000000724E000-memory.dmp family_redline behavioral2/memory/1096-333-0x0000000007210000-0x000000000724E000-memory.dmp family_redline behavioral2/memory/1096-335-0x0000000007210000-0x000000000724E000-memory.dmp family_redline behavioral2/memory/1096-337-0x0000000007210000-0x000000000724E000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wordpress.exe0x0009000000012317-1077.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation wordpress.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 0x0009000000012317-1077.exe -
Executes dropped EXE 12 IoCs
Processes:
wordpress.exesiga30.exeliba7591.exeliba9663.exef8281wD.exeSt4_soft.exeSt4_soft.exeg83eH44.exehVWki28.exewordpress.exei36tf53.exewordpress.exepid process 3320 wordpress.exe 1328 siga30.exe 2084 liba7591.exe 2168 liba9663.exe 1380 f8281wD.exe 348 St4_soft.exe 672 St4_soft.exe 4352 g83eH44.exe 1096 hVWki28.exe 1912 wordpress.exe 4592 i36tf53.exe 348 wordpress.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4504 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
f8281wD.exeg83eH44.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f8281wD.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g83eH44.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g83eH44.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
liba9663.exewordpress.exesiga30.exeliba7591.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce liba9663.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" liba9663.exe Set value (str) \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\siga30.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000001051\\siga30.exe" wordpress.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce siga30.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" siga30.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce liba7591.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" liba7591.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
St4_soft.exedescription pid process target process PID 348 set thread context of 672 348 St4_soft.exe St4_soft.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1528 4352 WerFault.exe g83eH44.exe 2008 1096 WerFault.exe hVWki28.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
f8281wD.exeg83eH44.exehVWki28.exei36tf53.exepid process 1380 f8281wD.exe 1380 f8281wD.exe 4352 g83eH44.exe 4352 g83eH44.exe 1096 hVWki28.exe 1096 hVWki28.exe 4592 i36tf53.exe 4592 i36tf53.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
f8281wD.exewmic.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1380 f8281wD.exe Token: SeIncreaseQuotaPrivilege 4748 wmic.exe Token: SeSecurityPrivilege 4748 wmic.exe Token: SeTakeOwnershipPrivilege 4748 wmic.exe Token: SeLoadDriverPrivilege 4748 wmic.exe Token: SeSystemProfilePrivilege 4748 wmic.exe Token: SeSystemtimePrivilege 4748 wmic.exe Token: SeProfSingleProcessPrivilege 4748 wmic.exe Token: SeIncBasePriorityPrivilege 4748 wmic.exe Token: SeCreatePagefilePrivilege 4748 wmic.exe Token: SeBackupPrivilege 4748 wmic.exe Token: SeRestorePrivilege 4748 wmic.exe Token: SeShutdownPrivilege 4748 wmic.exe Token: SeDebugPrivilege 4748 wmic.exe Token: SeSystemEnvironmentPrivilege 4748 wmic.exe Token: SeRemoteShutdownPrivilege 4748 wmic.exe Token: SeUndockPrivilege 4748 wmic.exe Token: SeManageVolumePrivilege 4748 wmic.exe Token: 33 4748 wmic.exe Token: 34 4748 wmic.exe Token: 35 4748 wmic.exe Token: 36 4748 wmic.exe Token: SeIncreaseQuotaPrivilege 4748 wmic.exe Token: SeSecurityPrivilege 4748 wmic.exe Token: SeTakeOwnershipPrivilege 4748 wmic.exe Token: SeLoadDriverPrivilege 4748 wmic.exe Token: SeSystemProfilePrivilege 4748 wmic.exe Token: SeSystemtimePrivilege 4748 wmic.exe Token: SeProfSingleProcessPrivilege 4748 wmic.exe Token: SeIncBasePriorityPrivilege 4748 wmic.exe Token: SeCreatePagefilePrivilege 4748 wmic.exe Token: SeBackupPrivilege 4748 wmic.exe Token: SeRestorePrivilege 4748 wmic.exe Token: SeShutdownPrivilege 4748 wmic.exe Token: SeDebugPrivilege 4748 wmic.exe Token: SeSystemEnvironmentPrivilege 4748 wmic.exe Token: SeRemoteShutdownPrivilege 4748 wmic.exe Token: SeUndockPrivilege 4748 wmic.exe Token: SeManageVolumePrivilege 4748 wmic.exe Token: 33 4748 wmic.exe Token: 34 4748 wmic.exe Token: 35 4748 wmic.exe Token: 36 4748 wmic.exe Token: SeIncreaseQuotaPrivilege 3204 WMIC.exe Token: SeSecurityPrivilege 3204 WMIC.exe Token: SeTakeOwnershipPrivilege 3204 WMIC.exe Token: SeLoadDriverPrivilege 3204 WMIC.exe Token: SeSystemProfilePrivilege 3204 WMIC.exe Token: SeSystemtimePrivilege 3204 WMIC.exe Token: SeProfSingleProcessPrivilege 3204 WMIC.exe Token: SeIncBasePriorityPrivilege 3204 WMIC.exe Token: SeCreatePagefilePrivilege 3204 WMIC.exe Token: SeBackupPrivilege 3204 WMIC.exe Token: SeRestorePrivilege 3204 WMIC.exe Token: SeShutdownPrivilege 3204 WMIC.exe Token: SeDebugPrivilege 3204 WMIC.exe Token: SeSystemEnvironmentPrivilege 3204 WMIC.exe Token: SeRemoteShutdownPrivilege 3204 WMIC.exe Token: SeUndockPrivilege 3204 WMIC.exe Token: SeManageVolumePrivilege 3204 WMIC.exe Token: 33 3204 WMIC.exe Token: 34 3204 WMIC.exe Token: 35 3204 WMIC.exe Token: 36 3204 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0x0009000000012317-1077.exewordpress.execmd.exesiga30.exeliba7591.exeliba9663.exeSt4_soft.exeSt4_soft.execmd.execmd.exedescription pid process target process PID 1156 wrote to memory of 3320 1156 0x0009000000012317-1077.exe wordpress.exe PID 1156 wrote to memory of 3320 1156 0x0009000000012317-1077.exe wordpress.exe PID 1156 wrote to memory of 3320 1156 0x0009000000012317-1077.exe wordpress.exe PID 3320 wrote to memory of 4792 3320 wordpress.exe schtasks.exe PID 3320 wrote to memory of 4792 3320 wordpress.exe schtasks.exe PID 3320 wrote to memory of 4792 3320 wordpress.exe schtasks.exe PID 3320 wrote to memory of 1044 3320 wordpress.exe cmd.exe PID 3320 wrote to memory of 1044 3320 wordpress.exe cmd.exe PID 3320 wrote to memory of 1044 3320 wordpress.exe cmd.exe PID 1044 wrote to memory of 1112 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 1112 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 1112 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 3420 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 3420 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 3420 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2472 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2472 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2472 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 5060 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 5060 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 5060 1044 cmd.exe cmd.exe PID 1044 wrote to memory of 4464 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 4464 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 4464 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2388 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2388 1044 cmd.exe cacls.exe PID 1044 wrote to memory of 2388 1044 cmd.exe cacls.exe PID 3320 wrote to memory of 1328 3320 wordpress.exe siga30.exe PID 3320 wrote to memory of 1328 3320 wordpress.exe siga30.exe PID 3320 wrote to memory of 1328 3320 wordpress.exe siga30.exe PID 1328 wrote to memory of 2084 1328 siga30.exe liba7591.exe PID 1328 wrote to memory of 2084 1328 siga30.exe liba7591.exe PID 1328 wrote to memory of 2084 1328 siga30.exe liba7591.exe PID 2084 wrote to memory of 2168 2084 liba7591.exe liba9663.exe PID 2084 wrote to memory of 2168 2084 liba7591.exe liba9663.exe PID 2084 wrote to memory of 2168 2084 liba7591.exe liba9663.exe PID 2168 wrote to memory of 1380 2168 liba9663.exe f8281wD.exe PID 2168 wrote to memory of 1380 2168 liba9663.exe f8281wD.exe PID 3320 wrote to memory of 348 3320 wordpress.exe St4_soft.exe PID 3320 wrote to memory of 348 3320 wordpress.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 348 wrote to memory of 672 348 St4_soft.exe St4_soft.exe PID 672 wrote to memory of 4748 672 St4_soft.exe wmic.exe PID 672 wrote to memory of 4748 672 St4_soft.exe wmic.exe PID 672 wrote to memory of 2248 672 St4_soft.exe cmd.exe PID 672 wrote to memory of 2248 672 St4_soft.exe cmd.exe PID 2248 wrote to memory of 3204 2248 cmd.exe WMIC.exe PID 2248 wrote to memory of 3204 2248 cmd.exe WMIC.exe PID 672 wrote to memory of 4752 672 St4_soft.exe cmd.exe PID 672 wrote to memory of 4752 672 St4_soft.exe cmd.exe PID 4752 wrote to memory of 4604 4752 cmd.exe WMIC.exe PID 4752 wrote to memory of 4604 4752 cmd.exe WMIC.exe PID 2168 wrote to memory of 4352 2168 liba9663.exe g83eH44.exe PID 2168 wrote to memory of 4352 2168 liba9663.exe g83eH44.exe PID 2168 wrote to memory of 4352 2168 liba9663.exe g83eH44.exe PID 2084 wrote to memory of 1096 2084 liba7591.exe hVWki28.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0x0009000000012317-1077.exe"C:\Users\Admin\AppData\Local\Temp\0x0009000000012317-1077.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exe"C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN wordpress.exe /TR "C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exe" /F3⤵
- Creates scheduled task(s)
PID:4792 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "wordpress.exe" /P "Admin:N"&&CACLS "wordpress.exe" /P "Admin:R" /E&&echo Y|CACLS "..\46aee2aca4" /P "Admin:N"&&CACLS "..\46aee2aca4" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1112
-
C:\Windows\SysWOW64\cacls.exeCACLS "wordpress.exe" /P "Admin:N"4⤵PID:3420
-
C:\Windows\SysWOW64\cacls.exeCACLS "wordpress.exe" /P "Admin:R" /E4⤵PID:2472
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:5060
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:N"4⤵PID:4464
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\46aee2aca4" /P "Admin:R" /E4⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\1000001051\siga30.exe"C:\Users\Admin\AppData\Local\Temp\1000001051\siga30.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\liba7591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\liba7591.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\liba9663.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\liba9663.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8281wD.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8281wD.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g83eH44.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g83eH44.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 10847⤵
- Program crash
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hVWki28.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hVWki28.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 18526⤵
- Program crash
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i36tf53.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i36tf53.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exe"C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\System32\Wbem\wmic.exewmic os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
PID:4748 -
C:\Windows\system32\cmd.execmd /C "wmic path win32_VideoController get name"5⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\System32\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\system32\cmd.execmd /C "wmic cpu get name"5⤵
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name6⤵PID:4604
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dll, Main3⤵
- Loads dropped DLL
PID:4504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4352 -ip 43521⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exe1⤵
- Executes dropped EXE
PID:1912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1096 -ip 10961⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeC:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exe1⤵
- Executes dropped EXE
PID:348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000001051\siga30.exeFilesize
844KB
MD5b93f37b3bfe0b331e15bb3ffac941f04
SHA1ae6968d31bfa137e98f3faf6d16d90ecfb1b23f9
SHA25678c5fa2cb5ac009370a09eb82bbc7ad80e1bf4947e39425dbc64768a00aec564
SHA512c3771a276a757d58302dcdaa6d42d0df34a40b0ae528ca992fe7e0867ec6f89b5953015a842221b21565136cbb127e8f2a86fcecce60cc2a4283c8881d63526b
-
C:\Users\Admin\AppData\Local\Temp\1000001051\siga30.exeFilesize
844KB
MD5b93f37b3bfe0b331e15bb3ffac941f04
SHA1ae6968d31bfa137e98f3faf6d16d90ecfb1b23f9
SHA25678c5fa2cb5ac009370a09eb82bbc7ad80e1bf4947e39425dbc64768a00aec564
SHA512c3771a276a757d58302dcdaa6d42d0df34a40b0ae528ca992fe7e0867ec6f89b5953015a842221b21565136cbb127e8f2a86fcecce60cc2a4283c8881d63526b
-
C:\Users\Admin\AppData\Local\Temp\1000001051\siga30.exeFilesize
844KB
MD5b93f37b3bfe0b331e15bb3ffac941f04
SHA1ae6968d31bfa137e98f3faf6d16d90ecfb1b23f9
SHA25678c5fa2cb5ac009370a09eb82bbc7ad80e1bf4947e39425dbc64768a00aec564
SHA512c3771a276a757d58302dcdaa6d42d0df34a40b0ae528ca992fe7e0867ec6f89b5953015a842221b21565136cbb127e8f2a86fcecce60cc2a4283c8881d63526b
-
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exeFilesize
7.5MB
MD51431d295525534f244dd34a8a311b87f
SHA12d0d2190ed780bf8dfed135bd1d12cae53860ebe
SHA25660f5cf24370600410d431405a2af891db1e19396a73d437b33f2e9c01e9fb27e
SHA512dd7085d43c12c1c7d59be73e66e5797966f7310fdd40ff2979fc770fa6fb5164484661fdfa7b73f8fc7a2dac32a452683f021e56fa4b1135bbbb9d140794ee02
-
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exeFilesize
7.5MB
MD51431d295525534f244dd34a8a311b87f
SHA12d0d2190ed780bf8dfed135bd1d12cae53860ebe
SHA25660f5cf24370600410d431405a2af891db1e19396a73d437b33f2e9c01e9fb27e
SHA512dd7085d43c12c1c7d59be73e66e5797966f7310fdd40ff2979fc770fa6fb5164484661fdfa7b73f8fc7a2dac32a452683f021e56fa4b1135bbbb9d140794ee02
-
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exeFilesize
7.5MB
MD51431d295525534f244dd34a8a311b87f
SHA12d0d2190ed780bf8dfed135bd1d12cae53860ebe
SHA25660f5cf24370600410d431405a2af891db1e19396a73d437b33f2e9c01e9fb27e
SHA512dd7085d43c12c1c7d59be73e66e5797966f7310fdd40ff2979fc770fa6fb5164484661fdfa7b73f8fc7a2dac32a452683f021e56fa4b1135bbbb9d140794ee02
-
C:\Users\Admin\AppData\Local\Temp\1000002001\St4_soft.exeFilesize
7.5MB
MD51431d295525534f244dd34a8a311b87f
SHA12d0d2190ed780bf8dfed135bd1d12cae53860ebe
SHA25660f5cf24370600410d431405a2af891db1e19396a73d437b33f2e9c01e9fb27e
SHA512dd7085d43c12c1c7d59be73e66e5797966f7310fdd40ff2979fc770fa6fb5164484661fdfa7b73f8fc7a2dac32a452683f021e56fa4b1135bbbb9d140794ee02
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeFilesize
235KB
MD545a52c031a49cfc0ce7d83cf85c9810a
SHA1d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
SHA256bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
SHA5127fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeFilesize
235KB
MD545a52c031a49cfc0ce7d83cf85c9810a
SHA1d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
SHA256bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
SHA5127fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeFilesize
235KB
MD545a52c031a49cfc0ce7d83cf85c9810a
SHA1d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
SHA256bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
SHA5127fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeFilesize
235KB
MD545a52c031a49cfc0ce7d83cf85c9810a
SHA1d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
SHA256bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
SHA5127fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
C:\Users\Admin\AppData\Local\Temp\46aee2aca4\wordpress.exeFilesize
235KB
MD545a52c031a49cfc0ce7d83cf85c9810a
SHA1d41bb20dcab894e4558eddce1fd1e7d45ba1f92d
SHA256bd71e03e2c0b5b324f02a1cfc38428f6764a58a9217d52d8cd15efe755db39be
SHA5127fa294fab489b38a08bcd186c5d49e7fcd437647a0a1c3b498d86be8dfc1320e84ada52b24de07c88bca4c253a0dfbb7a31d5fc48b82720f8695bac99c536c2f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i36tf53.exeFilesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i36tf53.exeFilesize
175KB
MD56c4c2a56d5dd785adbe4fe60fa3cc1f2
SHA1f8bd4379310258f8e54c47b56f5eec7394adb9a2
SHA256b182f2d3d49bdda2e29a0ed312deef4bee03983de54080c5e97ad6422de192d2
SHA512f6958cab80e2f7736cea307b51be546e50acd5494b72db0343a09e6ef8c446114f51be6c9826fcb6e9f7190e4ec8415c0a403c3c1706183577c2604b877ff830
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\liba7591.exeFilesize
702KB
MD55e3a688efebb4bc088fe9428aa043fab
SHA19b5614c605374a9b4d93d15db36f0766dc118a1b
SHA256311f74a45a3b8e7f88e7af384c1add5c4be488af9c57eaf36056ee6f045e797d
SHA5126ff805cadd094c4e15aa23c768d11f15c26f32229f726097d38469c58e71ce067a62284da0723ea9c7ddb23e2ca10f53b37c7bfee4d9fdd4979ca5cd6001afc7
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\liba7591.exeFilesize
702KB
MD55e3a688efebb4bc088fe9428aa043fab
SHA19b5614c605374a9b4d93d15db36f0766dc118a1b
SHA256311f74a45a3b8e7f88e7af384c1add5c4be488af9c57eaf36056ee6f045e797d
SHA5126ff805cadd094c4e15aa23c768d11f15c26f32229f726097d38469c58e71ce067a62284da0723ea9c7ddb23e2ca10f53b37c7bfee4d9fdd4979ca5cd6001afc7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hVWki28.exeFilesize
396KB
MD549618e480e47db51271f67ee4f06c84f
SHA1c6fa22473ccbef482422f958b1abf683e97fd32f
SHA256d521c439c3f9e32d56e88769773350ced847eb299a73f34dfda7289cce842c3e
SHA512246e92c255aee2e836114369cd7156f2c55a710abf7cfa97450e3c75eaf30c1685da0b5fb58783129fba48338c6084397558b4311fd07d4c8e9c42428410d9ed
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hVWki28.exeFilesize
396KB
MD549618e480e47db51271f67ee4f06c84f
SHA1c6fa22473ccbef482422f958b1abf683e97fd32f
SHA256d521c439c3f9e32d56e88769773350ced847eb299a73f34dfda7289cce842c3e
SHA512246e92c255aee2e836114369cd7156f2c55a710abf7cfa97450e3c75eaf30c1685da0b5fb58783129fba48338c6084397558b4311fd07d4c8e9c42428410d9ed
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\liba9663.exeFilesize
348KB
MD539ffe9287fa1a93b71239ba81d59d4bc
SHA1dc98a45cfa6f7706ce5329a1b0a72ac3fe9b57c0
SHA256c6360451f677d46830066ffd12dd464df148136b0530a1954ca7f0f320751f6f
SHA51249c15739f65348e3c6937b3becd014182652d62097ad578f627acb0d7140287407505cf061a1be1908eb97dc17bb94f04b108d1473032f374af01aeb6cd61d0d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\liba9663.exeFilesize
348KB
MD539ffe9287fa1a93b71239ba81d59d4bc
SHA1dc98a45cfa6f7706ce5329a1b0a72ac3fe9b57c0
SHA256c6360451f677d46830066ffd12dd464df148136b0530a1954ca7f0f320751f6f
SHA51249c15739f65348e3c6937b3becd014182652d62097ad578f627acb0d7140287407505cf061a1be1908eb97dc17bb94f04b108d1473032f374af01aeb6cd61d0d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8281wD.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8281wD.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g83eH44.exeFilesize
338KB
MD5c78f1f662ec2defbfd088cf36b05eff5
SHA196101b0323c96b7ad624847ae0735e7bc070d31a
SHA256cd0e3f92673b71d105164c9b433ca166ba713b735ce15ec446bc938f3d88fbe5
SHA512e9eb0cf5202e41d09dee69a59d233edd176c8dcfe3574affc39f853bd781e63164db2ed19d317bdf69013064279ce653a5b255b2c2fb29a7de17a6e88c6ce353
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g83eH44.exeFilesize
338KB
MD5c78f1f662ec2defbfd088cf36b05eff5
SHA196101b0323c96b7ad624847ae0735e7bc070d31a
SHA256cd0e3f92673b71d105164c9b433ca166ba713b735ce15ec446bc938f3d88fbe5
SHA512e9eb0cf5202e41d09dee69a59d233edd176c8dcfe3574affc39f853bd781e63164db2ed19d317bdf69013064279ce653a5b255b2c2fb29a7de17a6e88c6ce353
-
C:\Users\Admin\AppData\Local\Temp\RzLNTXYeUCWKsXbGyRAOmBTvKSJfjzaLFilesize
2KB
MD5dd7a4110e2dc0760efdd47ee918c0deb
SHA15ed5efe128e521023e0caf4fff9af747522c8166
SHA256550ad8794d9ec26bc7e09225cb1cbe648ee7c1c2349aabec8172f08bdec26084
SHA512c928725e5f010d371727aadcc057da91378a0b24c66b2848217e9186dd319b6bf09c0859d7bf523ff1736fc41591eb25662a900fbe3977b63132a0c40dcd35dc
-
C:\Users\Admin\AppData\Local\Temp\nJObCsNVlgTeMaPEZQleQYhYzRyWJjPjFilesize
71KB
MD5dc2b0f48d8f547d5ff7d67b371d850f0
SHA184d02ddbf478bf7cfe9ccb466362860ee18b3839
SHA2560434c46910f48821a0a442b510260a3faea9404d7e6a8edd2cf44cc7dfea3890
SHA5123470ae3db7053a7e606a221f97f8cadf58500a746daaa4c763d714fe99df026d1c7858aaaf6d34ec1bbaa5305f8eead00101b6a7ac6f4d457425d04bcf92e8d7
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllFilesize
89KB
MD5a55d0c5be5767946dadbc41ff81edfe4
SHA1e61fa4151224e9946aaa9b80c04a4124584e6eda
SHA2563650a22b9f187270ce7007c04a2af35ba8d5239067f90901ee4ffa96fae3e67e
SHA512a88654a6f39ce1ee30358118bc7f18db048e13efbe9022b0c57c7fa2304944e64ec14113af56fb11b7d782402f71f8000b2f2d5dd345408e950eae8f37431c8b
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllFilesize
89KB
MD5a55d0c5be5767946dadbc41ff81edfe4
SHA1e61fa4151224e9946aaa9b80c04a4124584e6eda
SHA2563650a22b9f187270ce7007c04a2af35ba8d5239067f90901ee4ffa96fae3e67e
SHA512a88654a6f39ce1ee30358118bc7f18db048e13efbe9022b0c57c7fa2304944e64ec14113af56fb11b7d782402f71f8000b2f2d5dd345408e950eae8f37431c8b
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\clip64.dllFilesize
89KB
MD5a55d0c5be5767946dadbc41ff81edfe4
SHA1e61fa4151224e9946aaa9b80c04a4124584e6eda
SHA2563650a22b9f187270ce7007c04a2af35ba8d5239067f90901ee4ffa96fae3e67e
SHA512a88654a6f39ce1ee30358118bc7f18db048e13efbe9022b0c57c7fa2304944e64ec14113af56fb11b7d782402f71f8000b2f2d5dd345408e950eae8f37431c8b
-
C:\Users\Admin\AppData\Roaming\c1ec479e5342a2\cred64.dllFilesize
235B
MD51e61052576779ddd7c5918a53b2e9899
SHA1ef05d4029741fb126efe45b9ec1562e47e7985f4
SHA256028f7bab62b6576a2bbed8759af3875bfbdd415c710bd14f67a2cb52b8f231c4
SHA512d0b450663aa23c437ffca63fcf1fba5603da6d9e0a691db8dd027c690afc7003731e924b8a08d9b852160e748431e553ff88451cf2fb048e6952fdd7ddba1202
-
memory/672-211-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-276-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-216-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-215-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-214-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-213-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-212-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-210-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-205-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/672-199-0x0000000000B00000-0x0000000000E5C000-memory.dmpFilesize
3.4MB
-
memory/1096-1236-0x0000000007E80000-0x0000000008498000-memory.dmpFilesize
6.1MB
-
memory/1096-1248-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-1252-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-1250-0x00000000093D0000-0x0000000009420000-memory.dmpFilesize
320KB
-
memory/1096-1249-0x0000000009350000-0x00000000093C6000-memory.dmpFilesize
472KB
-
memory/1096-1247-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-1246-0x0000000008CE0000-0x000000000920C000-memory.dmpFilesize
5.2MB
-
memory/1096-1245-0x0000000008B10000-0x0000000008CD2000-memory.dmpFilesize
1.8MB
-
memory/1096-1244-0x0000000008A20000-0x0000000008AB2000-memory.dmpFilesize
584KB
-
memory/1096-1243-0x0000000007D30000-0x0000000007D96000-memory.dmpFilesize
408KB
-
memory/1096-1240-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-1239-0x0000000007A40000-0x0000000007A7C000-memory.dmpFilesize
240KB
-
memory/1096-1238-0x0000000007A20000-0x0000000007A32000-memory.dmpFilesize
72KB
-
memory/1096-1237-0x00000000078E0000-0x00000000079EA000-memory.dmpFilesize
1.0MB
-
memory/1096-337-0x0000000007210000-0x000000000724E000-memory.dmpFilesize
248KB
-
memory/1096-335-0x0000000007210000-0x000000000724E000-memory.dmpFilesize
248KB
-
memory/1096-333-0x0000000007210000-0x000000000724E000-memory.dmpFilesize
248KB
-
memory/1096-327-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-326-0x00000000044D0000-0x000000000451B000-memory.dmpFilesize
300KB
-
memory/1096-328-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-329-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/1096-330-0x0000000007210000-0x000000000724E000-memory.dmpFilesize
248KB
-
memory/1096-331-0x0000000007210000-0x000000000724E000-memory.dmpFilesize
248KB
-
memory/1380-182-0x0000000000F40000-0x0000000000F4A000-memory.dmpFilesize
40KB
-
memory/4352-311-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-295-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-301-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-307-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-319-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4352-317-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4352-316-0x0000000000400000-0x0000000002B05000-memory.dmpFilesize
39.0MB
-
memory/4352-293-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-315-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4352-314-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4352-313-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-297-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-299-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-321-0x0000000000400000-0x0000000002B05000-memory.dmpFilesize
39.0MB
-
memory/4352-320-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4352-305-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-303-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-291-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-287-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-309-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-284-0x0000000002C10000-0x0000000002C3D000-memory.dmpFilesize
180KB
-
memory/4352-289-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-286-0x0000000004B80000-0x0000000004B92000-memory.dmpFilesize
72KB
-
memory/4352-285-0x0000000007270000-0x0000000007814000-memory.dmpFilesize
5.6MB
-
memory/4592-1258-0x0000000005910000-0x0000000005920000-memory.dmpFilesize
64KB
-
memory/4592-1257-0x0000000000CF0000-0x0000000000D22000-memory.dmpFilesize
200KB