Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 03:53
Static task
static1
General
-
Target
832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe
-
Size
1.0MB
-
MD5
0bcd59eed07aae4195d040d6e890784d
-
SHA1
ef1b4f5ae82d794719ba846ec4ccb745d488068a
-
SHA256
832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a
-
SHA512
e15347743d06fa795dfcff124bd7672ec207d138286d36796f6a7d64cf8cddf1c130dca1e2f0906119347de48bc0d927b2681a821eb749014334960b98f087a3
-
SSDEEP
24576:Jyays9sJtHQlkLqY3aXbQSMMT93lzLs6J+SKlj:8PsqDmkLqY3aXbQSMElz3
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Extracted
redline
bolt
193.233.20.31:4125
-
auth_value
29540c7bf0277243e2faf6601e15a754
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
USA
65.108.152.34:37345
-
auth_value
01ecb56953469aaed8efad25c0f68a64
Extracted
aurora
94.142.138.215:8081
Signatures
-
Processes:
v2159UV.exetz8482.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4308-200-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/4308-201-0x00000000051C0000-0x0000000005204000-memory.dmp family_redline behavioral1/memory/4308-202-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-203-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-205-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-209-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-213-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-215-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-217-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-221-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-219-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-223-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-225-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-227-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-229-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-231-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-233-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-235-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-237-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline behavioral1/memory/4308-239-0x00000000051C0000-0x00000000051FE000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 13 IoCs
Processes:
zap5273.exezap7952.exezap0853.exetz8482.exev2159UV.exew52KG33.exexulpu90.exey09gD20.exelegenda.exeusa.exevpn-go.exelegenda.exelegenda.exepid process 2356 zap5273.exe 2488 zap7952.exe 2816 zap0853.exe 4388 tz8482.exe 4396 v2159UV.exe 4308 w52KG33.exe 4024 xulpu90.exe 4852 y09gD20.exe 4516 legenda.exe 5116 usa.exe 5108 vpn-go.exe 2124 legenda.exe 4844 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4016 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz8482.exev2159UV.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8482.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2159UV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2159UV.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap5273.exezap7952.exezap0853.exe832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap5273.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7952.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap7952.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap0853.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5273.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
vpn-go.exedescription pid process target process PID 5108 set thread context of 3380 5108 vpn-go.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 43 IoCs
Processes:
tz8482.exev2159UV.exew52KG33.exexulpu90.exeusa.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4388 tz8482.exe 4388 tz8482.exe 4396 v2159UV.exe 4396 v2159UV.exe 4308 w52KG33.exe 4308 w52KG33.exe 4024 xulpu90.exe 4024 xulpu90.exe 5116 usa.exe 5116 usa.exe 1712 powershell.exe 1712 powershell.exe 1712 powershell.exe 1324 powershell.exe 1324 powershell.exe 1324 powershell.exe 1288 powershell.exe 1288 powershell.exe 1288 powershell.exe 2104 powershell.exe 2104 powershell.exe 2104 powershell.exe 2160 powershell.exe 2160 powershell.exe 2160 powershell.exe 4160 powershell.exe 4160 powershell.exe 4160 powershell.exe 4928 powershell.exe 4928 powershell.exe 4928 powershell.exe 1252 powershell.exe 1252 powershell.exe 1252 powershell.exe 2480 powershell.exe 2480 powershell.exe 2480 powershell.exe 4140 powershell.exe 4140 powershell.exe 4140 powershell.exe 364 powershell.exe 364 powershell.exe 364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tz8482.exev2159UV.exew52KG33.exexulpu90.exevpn-go.exeusa.exeWMIC.exewmic.exedescription pid process Token: SeDebugPrivilege 4388 tz8482.exe Token: SeDebugPrivilege 4396 v2159UV.exe Token: SeDebugPrivilege 4308 w52KG33.exe Token: SeDebugPrivilege 4024 xulpu90.exe Token: SeDebugPrivilege 5108 vpn-go.exe Token: SeDebugPrivilege 5116 usa.exe Token: SeIncreaseQuotaPrivilege 592 WMIC.exe Token: SeSecurityPrivilege 592 WMIC.exe Token: SeTakeOwnershipPrivilege 592 WMIC.exe Token: SeLoadDriverPrivilege 592 WMIC.exe Token: SeSystemProfilePrivilege 592 WMIC.exe Token: SeSystemtimePrivilege 592 WMIC.exe Token: SeProfSingleProcessPrivilege 592 WMIC.exe Token: SeIncBasePriorityPrivilege 592 WMIC.exe Token: SeCreatePagefilePrivilege 592 WMIC.exe Token: SeBackupPrivilege 592 WMIC.exe Token: SeRestorePrivilege 592 WMIC.exe Token: SeShutdownPrivilege 592 WMIC.exe Token: SeDebugPrivilege 592 WMIC.exe Token: SeSystemEnvironmentPrivilege 592 WMIC.exe Token: SeRemoteShutdownPrivilege 592 WMIC.exe Token: SeUndockPrivilege 592 WMIC.exe Token: SeManageVolumePrivilege 592 WMIC.exe Token: 33 592 WMIC.exe Token: 34 592 WMIC.exe Token: 35 592 WMIC.exe Token: 36 592 WMIC.exe Token: SeIncreaseQuotaPrivilege 592 WMIC.exe Token: SeSecurityPrivilege 592 WMIC.exe Token: SeTakeOwnershipPrivilege 592 WMIC.exe Token: SeLoadDriverPrivilege 592 WMIC.exe Token: SeSystemProfilePrivilege 592 WMIC.exe Token: SeSystemtimePrivilege 592 WMIC.exe Token: SeProfSingleProcessPrivilege 592 WMIC.exe Token: SeIncBasePriorityPrivilege 592 WMIC.exe Token: SeCreatePagefilePrivilege 592 WMIC.exe Token: SeBackupPrivilege 592 WMIC.exe Token: SeRestorePrivilege 592 WMIC.exe Token: SeShutdownPrivilege 592 WMIC.exe Token: SeDebugPrivilege 592 WMIC.exe Token: SeSystemEnvironmentPrivilege 592 WMIC.exe Token: SeRemoteShutdownPrivilege 592 WMIC.exe Token: SeUndockPrivilege 592 WMIC.exe Token: SeManageVolumePrivilege 592 WMIC.exe Token: 33 592 WMIC.exe Token: 34 592 WMIC.exe Token: 35 592 WMIC.exe Token: 36 592 WMIC.exe Token: SeIncreaseQuotaPrivilege 3480 wmic.exe Token: SeSecurityPrivilege 3480 wmic.exe Token: SeTakeOwnershipPrivilege 3480 wmic.exe Token: SeLoadDriverPrivilege 3480 wmic.exe Token: SeSystemProfilePrivilege 3480 wmic.exe Token: SeSystemtimePrivilege 3480 wmic.exe Token: SeProfSingleProcessPrivilege 3480 wmic.exe Token: SeIncBasePriorityPrivilege 3480 wmic.exe Token: SeCreatePagefilePrivilege 3480 wmic.exe Token: SeBackupPrivilege 3480 wmic.exe Token: SeRestorePrivilege 3480 wmic.exe Token: SeShutdownPrivilege 3480 wmic.exe Token: SeDebugPrivilege 3480 wmic.exe Token: SeSystemEnvironmentPrivilege 3480 wmic.exe Token: SeRemoteShutdownPrivilege 3480 wmic.exe Token: SeUndockPrivilege 3480 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exezap5273.exezap7952.exezap0853.exey09gD20.exelegenda.execmd.exevpn-go.exedescription pid process target process PID 1724 wrote to memory of 2356 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe zap5273.exe PID 1724 wrote to memory of 2356 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe zap5273.exe PID 1724 wrote to memory of 2356 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe zap5273.exe PID 2356 wrote to memory of 2488 2356 zap5273.exe zap7952.exe PID 2356 wrote to memory of 2488 2356 zap5273.exe zap7952.exe PID 2356 wrote to memory of 2488 2356 zap5273.exe zap7952.exe PID 2488 wrote to memory of 2816 2488 zap7952.exe zap0853.exe PID 2488 wrote to memory of 2816 2488 zap7952.exe zap0853.exe PID 2488 wrote to memory of 2816 2488 zap7952.exe zap0853.exe PID 2816 wrote to memory of 4388 2816 zap0853.exe tz8482.exe PID 2816 wrote to memory of 4388 2816 zap0853.exe tz8482.exe PID 2816 wrote to memory of 4396 2816 zap0853.exe v2159UV.exe PID 2816 wrote to memory of 4396 2816 zap0853.exe v2159UV.exe PID 2816 wrote to memory of 4396 2816 zap0853.exe v2159UV.exe PID 2488 wrote to memory of 4308 2488 zap7952.exe w52KG33.exe PID 2488 wrote to memory of 4308 2488 zap7952.exe w52KG33.exe PID 2488 wrote to memory of 4308 2488 zap7952.exe w52KG33.exe PID 2356 wrote to memory of 4024 2356 zap5273.exe xulpu90.exe PID 2356 wrote to memory of 4024 2356 zap5273.exe xulpu90.exe PID 2356 wrote to memory of 4024 2356 zap5273.exe xulpu90.exe PID 1724 wrote to memory of 4852 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe y09gD20.exe PID 1724 wrote to memory of 4852 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe y09gD20.exe PID 1724 wrote to memory of 4852 1724 832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe y09gD20.exe PID 4852 wrote to memory of 4516 4852 y09gD20.exe legenda.exe PID 4852 wrote to memory of 4516 4852 y09gD20.exe legenda.exe PID 4852 wrote to memory of 4516 4852 y09gD20.exe legenda.exe PID 4516 wrote to memory of 2160 4516 legenda.exe schtasks.exe PID 4516 wrote to memory of 2160 4516 legenda.exe schtasks.exe PID 4516 wrote to memory of 2160 4516 legenda.exe schtasks.exe PID 4516 wrote to memory of 760 4516 legenda.exe cmd.exe PID 4516 wrote to memory of 760 4516 legenda.exe cmd.exe PID 4516 wrote to memory of 760 4516 legenda.exe cmd.exe PID 760 wrote to memory of 5064 760 cmd.exe cmd.exe PID 760 wrote to memory of 5064 760 cmd.exe cmd.exe PID 760 wrote to memory of 5064 760 cmd.exe cmd.exe PID 760 wrote to memory of 5072 760 cmd.exe cacls.exe PID 760 wrote to memory of 5072 760 cmd.exe cacls.exe PID 760 wrote to memory of 5072 760 cmd.exe cacls.exe PID 760 wrote to memory of 4524 760 cmd.exe cacls.exe PID 760 wrote to memory of 4524 760 cmd.exe cacls.exe PID 760 wrote to memory of 4524 760 cmd.exe cacls.exe PID 760 wrote to memory of 4468 760 cmd.exe cmd.exe PID 760 wrote to memory of 4468 760 cmd.exe cmd.exe PID 760 wrote to memory of 4468 760 cmd.exe cmd.exe PID 760 wrote to memory of 2616 760 cmd.exe cacls.exe PID 760 wrote to memory of 2616 760 cmd.exe cacls.exe PID 760 wrote to memory of 2616 760 cmd.exe cacls.exe PID 760 wrote to memory of 4948 760 cmd.exe cacls.exe PID 760 wrote to memory of 4948 760 cmd.exe cacls.exe PID 760 wrote to memory of 4948 760 cmd.exe cacls.exe PID 4516 wrote to memory of 5116 4516 legenda.exe usa.exe PID 4516 wrote to memory of 5116 4516 legenda.exe usa.exe PID 4516 wrote to memory of 5116 4516 legenda.exe usa.exe PID 4516 wrote to memory of 5108 4516 legenda.exe vpn-go.exe PID 4516 wrote to memory of 5108 4516 legenda.exe vpn-go.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe PID 5108 wrote to memory of 3380 5108 vpn-go.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe"C:\Users\Admin\AppData\Local\Temp\832dfe0e21ba0424e041d3e387317a21aefc91467fea9be35d1acf9701d74d2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5273.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5273.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7952.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0853.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0853.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8482.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8482.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2159UV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2159UV.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w52KG33.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w52KG33.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xulpu90.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xulpu90.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y09gD20.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y09gD20.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000148001\usa.exe"C:\Users\Admin\AppData\Local\Temp\1000148001\usa.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000149001\vpn-go.exe"C:\Users\Admin\AppData\Local\Temp\1000149001\vpn-go.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"5⤵
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"6⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid7⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"6⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name7⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"6⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name7⤵
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo6⤵
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo7⤵
- Gathers system information
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\History\" \"C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiC\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAx\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data\" \"C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpL\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxP\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies\" \"C:\Users\Admin\AppData\Local\Temp\LDnJObCsNV\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYh\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data\" \"C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjz\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHs\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\bZRjxAwnwe\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State\" \"C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBA\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell "" "copy \"C:\Users\Admin\AppData\Local\Microsoft\Windows\History\" \"C:\Users\Admin\AppData\Local\Temp\kjQZLCtTMt\""6⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD5c558fdaa3884f969f1ec904ae7bbd991
SHA1b4f85d04f6bf061a17f52c264c065b786cfd33ff
SHA2563e2559b6ca355d011b05b1fcf35ed8b2375586fe6bb01bc367f24eb8ac82975e
SHA5126523c778fd9fab0085fafe7b4049e591403865212cc25109cb11f11584c7258bc15e0a5524d089d0f662151b22f3f8e6f871091cec57064c69a9a95903f9e7d4
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5fd572aa429389236441f5b68cbabc1bc
SHA1064451dfa0adebd7b3858dbf8db67223b8f08f37
SHA2564d31b39be1d9fdb5bc81dd24fb6afca6b19fd25cff78c277d36aec1515a7d1fc
SHA51264968ded2da5b3e927ff88d11b08d21111aa647ecd248fc4ef2cdae2525e51c7973ac717f36c7a0d9e9a4316b6a3a9a3982071bff5b2edd178c91b4483905fbe
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD50f7345e49e18bd04eec2c955d5f93203
SHA163d4903278e71ea8c7646b3e80dd06750f878e00
SHA25688afd66a6efb9145d8bd2dd0628c1ffc31bd67a5dbf624d0b295a2e1f01c9c67
SHA5129bdff8a497827036be2e0a0de0f631d552afaf9dfda46ca310adb7dc78e6072fa7d0f552df0522fd449827769285793a83d4f3b57a6a993829182363cb824b02
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5d723f440ac33b31e6ae83c59decb6bda
SHA150a55695425528af2c103914fab91dab9ea68e60
SHA256d2be34cf3613797a6c434311c271993815c8abd71e7d8816239160573de6c01f
SHA512391cfac6090de774e5653d43db94d4ba6b4ead35ed6f552d5cdd5883a779dfe18a07daffe27eb611c0c442ece85dac899309c0ad232ae20fda4302ccb313bc51
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD572b14d0d8f99892efd2f654cbd1fc307
SHA16e253ee80be367147a887ccdf9cf34f9afd17187
SHA256f872568b6bd21a3e9d0400f618ffd8cf6e2503151965768d94a83bde795791a6
SHA5120cc7ee8edbb91b1523b155edcb02bdd2d9908fd8f9ac9eddda3571e877fa32a240ab0351ab92fd8f4bd9637ae3b7d289b6557b4b78d9dba16f48dbc8a532dbba
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD50cb399210a13a235641d6bc4facdf4b2
SHA1875d5eb1d3e3e12d63e3deac5c383c929fab53e1
SHA256f4a8228ef5fe20fdb02f95bd70646b0a999c4dce66a0d8e19bf7ac157b541c23
SHA512a790907c5d89def8260fb4df429b92fc7bb590c8078cff0528a4c98c3d09829c041457a49a33fc6e1e8ffe4f70e7e1c31c1d51c46ee5975d90575580cc446c10
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD590a5d2872023a85e4d0925aa5f230bbc
SHA1f362d7215c4338db728bac7e70fe0b4dae92ce3c
SHA256b57f3a95681dd8d0ca6221e2e00614593c48e9d8186721348190d5bf18c6418e
SHA51238ce319b88690e237fe2d0e046be295a1c0b238face3ffe8f93b32d571b7ae4b7b9fe2b8e7a0a3ca11accbe7904b65bcb3cec96ee80b2dc70b265cb6be4211fb
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD5bbd2a62942c30e2f9d8a34de9635ddfc
SHA142e2111e641b1152886483f1c17938c8b6363a11
SHA256bc18972d3274684a4e6bd9f6db02d2f9676776db6667cfd765a474b99d1cc09b
SHA5125ca31be09540c004ad3ebb8380ed32bf3578c0975a3b3ec3112b71baf243ffaae369ea6d277349a226382073cf50f0694c86d5e4d1913a1e156edc834fa32452
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD554fe9e747773c72d02344b586d7f6ab0
SHA19be8c64d9a7191b7747e6a3f4d25a365b48110e5
SHA256a52b1bbcd3b97f78dc1385032787e12fa233f0f6697a225d500f99e9ff3da885
SHA512d68c64f4f0584481ecb37bc31d6e1dac52d8cffdf72106f381ca68bb09f55917e2b887bacfc35230f96ef00b41df92ddc791ba07332c23171682cdee087b6998
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD59f676d39fb09450fbf3be3560f58e7c3
SHA1f6a674c07980be070e47aa6d6a7ee45b66d923d0
SHA2569d3629002b1c6cca814c58c6e74b921e7ae1de287fa3be1a659c8ca632e24702
SHA512304dca509ad0356a37f3bb3188d175e2be0650744b54d3bee98c3db68555427f2342d1df910e47bb0930ddc150410b58a5a4205b4da894be1302f5418fffb81d
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
16KB
MD571f8ad881e56247399a341ecdf81e805
SHA1755bfd6b5b13a3b665d1c1bca600208898025a3f
SHA25624c6dab6cf5adf5f75899e54efdc0c23f37ff61e494af7e4fbab9693620528fe
SHA512ac84b3bb917692d942a187052f14aae470c7c1d79bf1193f5c18d15064b8241cdce9dd35944f92eec32ac4d8f288fd5bd129aa821e59696633638b61ec52cb9c
-
C:\Users\Admin\AppData\Local\Temp\1000148001\usa.exeFilesize
335KB
MD5f00f6596f6bf65d01cb390aebc5326f5
SHA18e8d257bd51d2213ed871c4b8b88a0238036e313
SHA2562e54e59e1fabb5accbef4a42a2cf7af640c57ac0fa7e3542c160662fb327caa7
SHA51274bde8fd32b51b42c6cc70790f86ae4bc1b83f37aa6e246d147469220c46b5d789d9349fef961491917a773dca061665cc09ab858df449f5119e96e59fbf0fb0
-
C:\Users\Admin\AppData\Local\Temp\1000148001\usa.exeFilesize
335KB
MD5f00f6596f6bf65d01cb390aebc5326f5
SHA18e8d257bd51d2213ed871c4b8b88a0238036e313
SHA2562e54e59e1fabb5accbef4a42a2cf7af640c57ac0fa7e3542c160662fb327caa7
SHA51274bde8fd32b51b42c6cc70790f86ae4bc1b83f37aa6e246d147469220c46b5d789d9349fef961491917a773dca061665cc09ab858df449f5119e96e59fbf0fb0
-
C:\Users\Admin\AppData\Local\Temp\1000148001\usa.exeFilesize
335KB
MD5f00f6596f6bf65d01cb390aebc5326f5
SHA18e8d257bd51d2213ed871c4b8b88a0238036e313
SHA2562e54e59e1fabb5accbef4a42a2cf7af640c57ac0fa7e3542c160662fb327caa7
SHA51274bde8fd32b51b42c6cc70790f86ae4bc1b83f37aa6e246d147469220c46b5d789d9349fef961491917a773dca061665cc09ab858df449f5119e96e59fbf0fb0
-
C:\Users\Admin\AppData\Local\Temp\1000149001\vpn-go.exeFilesize
9.6MB
MD5e38edcf41b7b13dc8837e030774cf083
SHA11ed5f18fbc105fd177129f594d63e3297654acff
SHA2569e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc
SHA51217021db0c40c5068c1df61e3682cd967fec74a76e661d5967b3950d2a0f2a3a64ea15abcfd21b89223fb541d3561172a0dbdcc2a63694996518e0fde8ced1080
-
C:\Users\Admin\AppData\Local\Temp\1000149001\vpn-go.exeFilesize
9.6MB
MD5e38edcf41b7b13dc8837e030774cf083
SHA11ed5f18fbc105fd177129f594d63e3297654acff
SHA2569e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc
SHA51217021db0c40c5068c1df61e3682cd967fec74a76e661d5967b3950d2a0f2a3a64ea15abcfd21b89223fb541d3561172a0dbdcc2a63694996518e0fde8ced1080
-
C:\Users\Admin\AppData\Local\Temp\1000149001\vpn-go.exeFilesize
9.6MB
MD5e38edcf41b7b13dc8837e030774cf083
SHA11ed5f18fbc105fd177129f594d63e3297654acff
SHA2569e83c3a822bc5253e9b5047fd2ee19abce885852db7afcb70d9b76fc470f69bc
SHA51217021db0c40c5068c1df61e3682cd967fec74a76e661d5967b3950d2a0f2a3a64ea15abcfd21b89223fb541d3561172a0dbdcc2a63694996518e0fde8ced1080
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y09gD20.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y09gD20.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5273.exeFilesize
842KB
MD555abd113ad213d894c70abf89ad601c4
SHA1cddfe5971914d4abfa31b4d6e8ae8151103f053c
SHA256d1be9d59bd3605757b177b30bc7f7866970d57c6f14fe77dbc62e4795f0ba515
SHA512cb9eb9931bff0c59390ec600332ea5a7e44c78b7cdaf3ab483ac3c7de732745ec0199b64686853e5b88b0296f58839c30b864d34cef373f89a08ff992acbf1aa
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5273.exeFilesize
842KB
MD555abd113ad213d894c70abf89ad601c4
SHA1cddfe5971914d4abfa31b4d6e8ae8151103f053c
SHA256d1be9d59bd3605757b177b30bc7f7866970d57c6f14fe77dbc62e4795f0ba515
SHA512cb9eb9931bff0c59390ec600332ea5a7e44c78b7cdaf3ab483ac3c7de732745ec0199b64686853e5b88b0296f58839c30b864d34cef373f89a08ff992acbf1aa
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xulpu90.exeFilesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xulpu90.exeFilesize
175KB
MD578efaf7292c2027da40635ca1aae855a
SHA1686227a48e23b382a06c74f17d9b6f36e76042fd
SHA2562f1381bbe319ee3d19b3e07704205a3d31a7ffb7b5b7c282b9d884682bc892ab
SHA51219e22ec7ad2295a1a3f4cbabb2e005df674ff3731cc33b74e175e10fcc4e482c8f0ce9c8722a8d14a0f9f9ad6e37360ce6816215512bea8324cd87a9fefc852a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7952.exeFilesize
700KB
MD58d088af9cd731b7a711b529960d60c9f
SHA1d61fccc3dc3f60c6dbe394f35a83e688d030cf89
SHA25644ac5ea881717646097f874a9f63679e44a60ceaf8de29a79e4a2fb72b8176b6
SHA512fa1f2274f33972a0dda783e4fbfbdfee9b518184db2e87326a37e7afe051a63aef96f3105316cc66c47e1a4abcf7f8bc10bdb28637c4402a78a27d62c096f27f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap7952.exeFilesize
700KB
MD58d088af9cd731b7a711b529960d60c9f
SHA1d61fccc3dc3f60c6dbe394f35a83e688d030cf89
SHA25644ac5ea881717646097f874a9f63679e44a60ceaf8de29a79e4a2fb72b8176b6
SHA512fa1f2274f33972a0dda783e4fbfbdfee9b518184db2e87326a37e7afe051a63aef96f3105316cc66c47e1a4abcf7f8bc10bdb28637c4402a78a27d62c096f27f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w52KG33.exeFilesize
358KB
MD55fc63b9c71b6159c6a520e45175cf2e4
SHA156e53449420445bdbeb65ba262425ccc92c6bfa9
SHA256407b9b8967afe66fc98a11c9aeff3426e18356e83e5e77fa71864ac5b38ca7ad
SHA512c65c755ed24f6e019e897ddc2b3f32ed6ba714e1831f654fb05843a2dbc45b8fdfeb2d4223b4daab46e8649e33b5c6408faf291c21143346665686cb67182748
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w52KG33.exeFilesize
358KB
MD55fc63b9c71b6159c6a520e45175cf2e4
SHA156e53449420445bdbeb65ba262425ccc92c6bfa9
SHA256407b9b8967afe66fc98a11c9aeff3426e18356e83e5e77fa71864ac5b38ca7ad
SHA512c65c755ed24f6e019e897ddc2b3f32ed6ba714e1831f654fb05843a2dbc45b8fdfeb2d4223b4daab46e8649e33b5c6408faf291c21143346665686cb67182748
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0853.exeFilesize
347KB
MD5146530c4d8c2f420a63502d62fc1512b
SHA17bed0049a6c227f2d5a1f751458a61af8e9c6e1e
SHA256a2abc170f98d53f50ea48ea3a48da4acdb5d65094867c173383d738960d89320
SHA51277c817a828760536aa6ff4322174d8409192eac7656ff0e93ad40ccd4b0e17eeb597c47abf9fd1ea0765655150fa4e816f0104429842665636a3325f33893a76
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0853.exeFilesize
347KB
MD5146530c4d8c2f420a63502d62fc1512b
SHA17bed0049a6c227f2d5a1f751458a61af8e9c6e1e
SHA256a2abc170f98d53f50ea48ea3a48da4acdb5d65094867c173383d738960d89320
SHA51277c817a828760536aa6ff4322174d8409192eac7656ff0e93ad40ccd4b0e17eeb597c47abf9fd1ea0765655150fa4e816f0104429842665636a3325f33893a76
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8482.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8482.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2159UV.exeFilesize
300KB
MD5bda70594f09ca2f3261f42a670bc7bdb
SHA15c7af57fbcad0305829a7cce16ab140231410e90
SHA256333051b4945fb473a1430704057a333a18365df119208bc6a374d6c9ff6e695d
SHA5123d749e6e0baf302e6fec0e2c41dff0d4d4b3d8d32e6a7abe919de595182316aeeb17df2b7d1bc650d9c7cfa90a6bdea8e9b7b632420ea068c8b3c16b0a2c1c49
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2159UV.exeFilesize
300KB
MD5bda70594f09ca2f3261f42a670bc7bdb
SHA15c7af57fbcad0305829a7cce16ab140231410e90
SHA256333051b4945fb473a1430704057a333a18365df119208bc6a374d6c9ff6e695d
SHA5123d749e6e0baf302e6fec0e2c41dff0d4d4b3d8d32e6a7abe919de595182316aeeb17df2b7d1bc650d9c7cfa90a6bdea8e9b7b632420ea068c8b3c16b0a2c1c49
-
C:\Users\Admin\AppData\Local\Temp\LDnJObCsNVFilesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
C:\Users\Admin\AppData\Local\Temp\MRAjWwhTHctcuAxFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\SjFbcXoEFfRsWxPFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\XVlBzgbaiCFilesize
148KB
MD590a1d4b55edf36fa8b4cc6974ed7d4c4
SHA1aba1b8d0e05421e7df5982899f626211c3c4b5c1
SHA2567cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c
SHA512ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2
-
C:\Users\Admin\AppData\Local\Temp\YzRyWJjPjzFilesize
92KB
MD5b133605a69c0c42d03bb7e5020b86258
SHA1ad8bb42ba6411cf8df977b47f2dbed7d4a214a0f
SHA256f0c9146c1d86eac1962b0722ccf051e8783c1e8977380cba1ce366a41861d20a
SHA5122f32b79eccb10f524e82eab7301630a504046075a066b0383cb546b7569d2b558a4db45a9ca6743f969e9bf970896e7e0df6cc9f214542527c8bb9e0f323e15c
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_adricq43.130.ps1Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\bZRjxAwnweFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\hxKQFDaFpLFilesize
46KB
MD502d2c46697e3714e49f46b680b9a6b83
SHA184f98b56d49f01e9b6b76a4e21accf64fd319140
SHA256522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9
SHA51260348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac
-
C:\Users\Admin\AppData\Local\Temp\krBEmfdzdcEkXBAFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\lgTeMaPEZQleQYhFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Local\Temp\pfRFEgmotaFetHsFilesize
71KB
MD537d3ac31e4c461ff9653acc7dd3b84f4
SHA125eb0affe01e06afc46a66fa183fe33e02c62975
SHA2562e9f14bd648e3a8e98f8a5fbc1d9290d46420a3c15b16a78f8e9e7cbaa8ab073
SHA5122c1aede1b467729fd8f00eedd863c8d8226b582af658f42aad7ffe79dab3e14c6e55d0426dc997ac73e6d8cd78511bc37da5a211bb5e2c1faed372bc4674ecf4
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
memory/1288-1254-0x0000000007700000-0x0000000007A50000-memory.dmpFilesize
3.3MB
-
memory/1288-1258-0x0000000007C70000-0x0000000007CBB000-memory.dmpFilesize
300KB
-
memory/1288-1257-0x0000000006880000-0x0000000006890000-memory.dmpFilesize
64KB
-
memory/1288-1256-0x0000000006880000-0x0000000006890000-memory.dmpFilesize
64KB
-
memory/1324-1233-0x0000000004610000-0x0000000004620000-memory.dmpFilesize
64KB
-
memory/1324-1232-0x0000000004610000-0x0000000004620000-memory.dmpFilesize
64KB
-
memory/1324-1230-0x0000000007930000-0x0000000007C80000-memory.dmpFilesize
3.3MB
-
memory/1712-1219-0x0000000009640000-0x00000000096D4000-memory.dmpFilesize
592KB
-
memory/1712-1198-0x0000000007610000-0x0000000007676000-memory.dmpFilesize
408KB
-
memory/1712-1221-0x00000000093C0000-0x00000000093E2000-memory.dmpFilesize
136KB
-
memory/1712-1220-0x0000000009360000-0x000000000937A000-memory.dmpFilesize
104KB
-
memory/1712-1195-0x0000000004A60000-0x0000000004A96000-memory.dmpFilesize
216KB
-
memory/1712-1203-0x00000000082B0000-0x00000000082FB000-memory.dmpFilesize
300KB
-
memory/1712-1202-0x0000000007D70000-0x0000000007D8C000-memory.dmpFilesize
112KB
-
memory/1712-1201-0x0000000007050000-0x0000000007060000-memory.dmpFilesize
64KB
-
memory/1712-1200-0x0000000007050000-0x0000000007060000-memory.dmpFilesize
64KB
-
memory/1712-1199-0x0000000007EA0000-0x00000000081F0000-memory.dmpFilesize
3.3MB
-
memory/1712-1196-0x0000000007690000-0x0000000007CB8000-memory.dmpFilesize
6.2MB
-
memory/1712-1197-0x0000000007500000-0x0000000007522000-memory.dmpFilesize
136KB
-
memory/3380-1186-0x0000000000400000-0x0000000000747000-memory.dmpFilesize
3.3MB
-
memory/3380-1212-0x0000000000400000-0x0000000000747000-memory.dmpFilesize
3.3MB
-
memory/4024-1136-0x0000000005640000-0x0000000005650000-memory.dmpFilesize
64KB
-
memory/4024-1134-0x0000000000D20000-0x0000000000D52000-memory.dmpFilesize
200KB
-
memory/4024-1135-0x0000000005760000-0x00000000057AB000-memory.dmpFilesize
300KB
-
memory/4308-215-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-231-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-235-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-213-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-1127-0x00000000065A0000-0x0000000006762000-memory.dmpFilesize
1.8MB
-
memory/4308-202-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-237-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-201-0x00000000051C0000-0x0000000005204000-memory.dmpFilesize
272KB
-
memory/4308-229-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-227-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-225-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-223-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-219-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-221-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-217-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-208-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1125-0x0000000006500000-0x0000000006550000-memory.dmpFilesize
320KB
-
memory/4308-200-0x00000000025B0000-0x00000000025F6000-memory.dmpFilesize
280KB
-
memory/4308-207-0x0000000000720000-0x000000000076B000-memory.dmpFilesize
300KB
-
memory/4308-210-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-233-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-1128-0x0000000006770000-0x0000000006C9C000-memory.dmpFilesize
5.2MB
-
memory/4308-1126-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-203-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-205-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-1124-0x0000000006460000-0x00000000064D6000-memory.dmpFilesize
472KB
-
memory/4308-1123-0x0000000005DA0000-0x0000000005E06000-memory.dmpFilesize
408KB
-
memory/4308-1122-0x0000000005D00000-0x0000000005D92000-memory.dmpFilesize
584KB
-
memory/4308-1121-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1120-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1119-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1117-0x0000000005B70000-0x0000000005BBB000-memory.dmpFilesize
300KB
-
memory/4308-1116-0x0000000005A20000-0x0000000005A5E000-memory.dmpFilesize
248KB
-
memory/4308-1115-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1114-0x0000000005A00000-0x0000000005A12000-memory.dmpFilesize
72KB
-
memory/4308-212-0x0000000002600000-0x0000000002610000-memory.dmpFilesize
64KB
-
memory/4308-1113-0x00000000058C0000-0x00000000059CA000-memory.dmpFilesize
1.0MB
-
memory/4308-209-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4308-1112-0x0000000005230000-0x0000000005836000-memory.dmpFilesize
6.0MB
-
memory/4308-239-0x00000000051C0000-0x00000000051FE000-memory.dmpFilesize
248KB
-
memory/4388-149-0x0000000000CB0000-0x0000000000CBA000-memory.dmpFilesize
40KB
-
memory/4396-183-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-177-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-155-0x00000000001D0000-0x00000000001FD000-memory.dmpFilesize
180KB
-
memory/4396-156-0x0000000002220000-0x000000000223A000-memory.dmpFilesize
104KB
-
memory/4396-157-0x0000000004ED0000-0x00000000053CE000-memory.dmpFilesize
5.0MB
-
memory/4396-158-0x0000000002490000-0x00000000024A8000-memory.dmpFilesize
96KB
-
memory/4396-195-0x0000000000400000-0x000000000070E000-memory.dmpFilesize
3.1MB
-
memory/4396-193-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4396-192-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4396-191-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4396-190-0x0000000000400000-0x000000000070E000-memory.dmpFilesize
3.1MB
-
memory/4396-189-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-187-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-185-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-159-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4396-181-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-179-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-160-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/4396-175-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-173-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-171-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-169-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-167-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-165-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-163-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-162-0x0000000002490000-0x00000000024A2000-memory.dmpFilesize
72KB
-
memory/4396-161-0x0000000004EC0000-0x0000000004ED0000-memory.dmpFilesize
64KB
-
memory/5108-1179-0x000000001BCD0000-0x000000001BF50000-memory.dmpFilesize
2.5MB
-
memory/5108-1176-0x0000000000580000-0x0000000000F2A000-memory.dmpFilesize
9.7MB
-
memory/5108-1177-0x000000001BBC0000-0x000000001BBD0000-memory.dmpFilesize
64KB
-
memory/5108-1178-0x0000000001480000-0x0000000001481000-memory.dmpFilesize
4KB
-
memory/5116-1161-0x0000000000CE0000-0x0000000000CE6000-memory.dmpFilesize
24KB
-
memory/5116-1162-0x000000000A620000-0x000000000A66B000-memory.dmpFilesize
300KB
-
memory/5116-1160-0x0000000000460000-0x00000000004BA000-memory.dmpFilesize
360KB