Analysis
-
max time kernel
140s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24-03-2023 16:37
Static task
static1
Behavioral task
behavioral1
Sample
935c8459f31edb0ec9be0e6ce3cb53ab.exe
Resource
win7-20230220-en
General
-
Target
935c8459f31edb0ec9be0e6ce3cb53ab.exe
-
Size
1013KB
-
MD5
935c8459f31edb0ec9be0e6ce3cb53ab
-
SHA1
ea766a0431c3dc91336432d0ff7b26e45d5bacf9
-
SHA256
74faa2ec8f6fb1ab3d84f5a14824e4d58d0cc5d610021f5edf250184de062e0a
-
SHA512
969c42a0f20c7d68dd5dc52cdedeaedca5783e650bfee43e823b049b85e1c47885cc655cc5cf58abafdad9a23c388f016c0552fc7e30a74a2ca19a52faff9c5b
-
SSDEEP
24576:2yyuQU6oDHu7pQLRBOrFPkVfovB1NcwWVM:FyuQkHforhkRoJ1NcL
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
Anh123
199.115.193.116:11300
-
auth_value
db990971ec3911c24ea05eeccc2e1f60
Extracted
redline
whitedoc
81.161.229.143:45156
-
auth_value
2020d22aaa2ecafa1b12e00dfcffae03
Signatures
-
Processes:
tz4768.exev6855WI.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v6855WI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v6855WI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v6855WI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v6855WI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v6855WI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz4768.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 22 IoCs
Processes:
resource yara_rule behavioral1/memory/1112-149-0x0000000004820000-0x0000000004866000-memory.dmp family_redline behavioral1/memory/1112-150-0x00000000048B0000-0x00000000048F4000-memory.dmp family_redline behavioral1/memory/1112-152-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-151-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-154-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-156-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-158-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-160-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-162-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-164-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-166-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-168-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-172-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-174-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-176-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-180-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-182-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-184-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-187-0x00000000072C0000-0x0000000007300000-memory.dmp family_redline behavioral1/memory/1112-178-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-170-0x00000000048B0000-0x00000000048EF000-memory.dmp family_redline behavioral1/memory/1112-1059-0x00000000072C0000-0x0000000007300000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 14 IoCs
Processes:
zap5766.exezap4075.exezap2174.exetz4768.exev6855WI.exew05AV57.exexAPed82.exey86tu48.exelegenda.exeNasalized.exe76783.exeNasalized.exebuild.exelegenda.exepid process 1120 zap5766.exe 1220 zap4075.exe 1964 zap2174.exe 1680 tz4768.exe 1408 v6855WI.exe 1112 w05AV57.exe 1860 xAPed82.exe 1540 y86tu48.exe 1756 legenda.exe 1204 Nasalized.exe 1876 76783.exe 936 Nasalized.exe 1284 build.exe 2060 legenda.exe -
Loads dropped DLL 31 IoCs
Processes:
935c8459f31edb0ec9be0e6ce3cb53ab.exezap5766.exezap4075.exezap2174.exev6855WI.exew05AV57.exexAPed82.exey86tu48.exelegenda.exeNasalized.exe76783.exeNasalized.exerundll32.exepid process 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe 1120 zap5766.exe 1120 zap5766.exe 1220 zap4075.exe 1220 zap4075.exe 1964 zap2174.exe 1964 zap2174.exe 1964 zap2174.exe 1964 zap2174.exe 1408 v6855WI.exe 1220 zap4075.exe 1220 zap4075.exe 1112 w05AV57.exe 1120 zap5766.exe 1860 xAPed82.exe 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe 1540 y86tu48.exe 1540 y86tu48.exe 1756 legenda.exe 1756 legenda.exe 1756 legenda.exe 1204 Nasalized.exe 1204 Nasalized.exe 1756 legenda.exe 1876 76783.exe 936 Nasalized.exe 1876 76783.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe 3020 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
v6855WI.exetz4768.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features v6855WI.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v6855WI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features tz4768.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz4768.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 9 IoCs
Processes:
935c8459f31edb0ec9be0e6ce3cb53ab.exezap5766.exebuild.exezap4075.exezap2174.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 935c8459f31edb0ec9be0e6ce3cb53ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap5766.exe Set value (str) \REGISTRY\USER\S-1-5-21-3499517378-2376672570-1134980332-1000\Software\Microsoft\Windows\CurrentVersion\Run\build = "C:\\Users\\Admin\\AppData\\Local\\5bfd3d4bd402ce9c620b366b536d7015\\build.exe" build.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 935c8459f31edb0ec9be0e6ce3cb53ab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap5766.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4075.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap4075.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap2174.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 icanhazip.com -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
Nasalized.exe76783.exedescription pid process target process PID 1204 set thread context of 936 1204 Nasalized.exe Nasalized.exe PID 1876 set thread context of 292 1876 76783.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
build.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 build.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier build.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
build.exepid process 1284 build.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 5 IoCs
Processes:
chcp.comnetsh.exefindstr.exechcp.comnetsh.exepid process 2128 chcp.com 2164 netsh.exe 2172 findstr.exe 2244 chcp.com 2252 netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tz4768.exev6855WI.exew05AV57.exexAPed82.exe76783.exepid process 1680 tz4768.exe 1680 tz4768.exe 1408 v6855WI.exe 1408 v6855WI.exe 1112 w05AV57.exe 1112 w05AV57.exe 1860 xAPed82.exe 1860 xAPed82.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe 1876 76783.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
Processes:
tz4768.exev6855WI.exew05AV57.exexAPed82.exe76783.exebuild.exemsiexec.exeNasalized.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1680 tz4768.exe Token: SeDebugPrivilege 1408 v6855WI.exe Token: SeDebugPrivilege 1112 w05AV57.exe Token: SeDebugPrivilege 1860 xAPed82.exe Token: SeDebugPrivilege 1876 76783.exe Token: SeDebugPrivilege 1284 build.exe Token: SeRestorePrivilege 2324 msiexec.exe Token: SeTakeOwnershipPrivilege 2324 msiexec.exe Token: SeSecurityPrivilege 2324 msiexec.exe Token: SeDebugPrivilege 936 Nasalized.exe Token: SeDebugPrivilege 292 InstallUtil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
build.exepid process 1284 build.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
935c8459f31edb0ec9be0e6ce3cb53ab.exezap5766.exezap4075.exezap2174.exey86tu48.exelegenda.exedescription pid process target process PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1700 wrote to memory of 1120 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe zap5766.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1120 wrote to memory of 1220 1120 zap5766.exe zap4075.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1220 wrote to memory of 1964 1220 zap4075.exe zap2174.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1680 1964 zap2174.exe tz4768.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1964 wrote to memory of 1408 1964 zap2174.exe v6855WI.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1220 wrote to memory of 1112 1220 zap4075.exe w05AV57.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1120 wrote to memory of 1860 1120 zap5766.exe xAPed82.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1700 wrote to memory of 1540 1700 935c8459f31edb0ec9be0e6ce3cb53ab.exe y86tu48.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1540 wrote to memory of 1756 1540 y86tu48.exe legenda.exe PID 1756 wrote to memory of 2040 1756 legenda.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\935c8459f31edb0ec9be0e6ce3cb53ab.exe"C:\Users\Admin\AppData\Local\Temp\935c8459f31edb0ec9be0e6ce3cb53ab.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4768.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4768.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeC:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All6⤵
-
C:\Windows\system32\chcp.comchcp 650017⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\netsh.exenetsh wlan show profile7⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\findstr.exefindstr All7⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\cmd.exe"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid6⤵
-
C:\Windows\system32\chcp.comchcp 650017⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\netsh.exenetsh wlan show networks mode=bssid7⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\taskeng.exetaskeng.exe {EF59753B-AFAD-4E5E-8A08-C44B76D4CB09} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015Filesize
61KB
MD5e71c8443ae0bc2e282c73faead0a6dd3
SHA10c110c1b01e68edfacaeae64781a37b1995fa94b
SHA25695b0a5acc5bf70d3abdfd091d0c9f9063aa4fde65bd34dbf16786082e1992e72
SHA512b38458c7fa2825afb72794f374827403d5946b1132e136a0ce075dfd351277cf7d957c88dc8a1e4adc3bcae1fa8010dae3831e268e910d517691de24326391a6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015Filesize
342B
MD5b600a09da0ea215fc39e8e0939676560
SHA1922dab68408f9a6e26b9687c8c1e245d259cf243
SHA256498a00895b7c1e5aad2b00315e34c85d27a6d769172eb82ec5e6d0e1ea6869a2
SHA5122191d07106af14f6005203f386ec91ac885b4f6c549706fc9a3167200e6ba34e786d516ad37b1541f0fd13128ed35b074b58f412a14eba438d38c5463c9723c1
-
C:\Users\Admin\AppData\Local\5bfd3d4bd402ce9c620b366b536d7015\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exeFilesize
829KB
MD59bea9d1a577e90ce387958c1507b0918
SHA1b7579a4fe32afd8cc5e61a3363f8552249b8a42b
SHA256f69aced34f60ab9fb4b4a298f4889381733932dcff96577282bb5fb6140aec2e
SHA5123224ff1926fe706d364c3670e63392277cd704e17d04c2d5b113950c271fa953a0f3ce153ea09ff905bfcbb002485c15436a2fb66097d3dd6f97d877bbcadeff
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exeFilesize
829KB
MD59bea9d1a577e90ce387958c1507b0918
SHA1b7579a4fe32afd8cc5e61a3363f8552249b8a42b
SHA256f69aced34f60ab9fb4b4a298f4889381733932dcff96577282bb5fb6140aec2e
SHA5123224ff1926fe706d364c3670e63392277cd704e17d04c2d5b113950c271fa953a0f3ce153ea09ff905bfcbb002485c15436a2fb66097d3dd6f97d877bbcadeff
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exeFilesize
687KB
MD507f05ba4795888230a232c52605fa4f1
SHA171162b41a85670c734f87b9f91919c26edfb2beb
SHA2562fda4e170a0ef722e22c8dda3ad79c8c39251fe83db7e119b02b883d30f7e6ec
SHA5121f00d611cc11c7e94b397c6ec763d3d1dc455ee0c3b1c20e56e40cf6e79d3d7e1d897dd02f43852c1721047c72ec7963be4d130f1d40ed9d3de58d520e07d456
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exeFilesize
687KB
MD507f05ba4795888230a232c52605fa4f1
SHA171162b41a85670c734f87b9f91919c26edfb2beb
SHA2562fda4e170a0ef722e22c8dda3ad79c8c39251fe83db7e119b02b883d30f7e6ec
SHA5121f00d611cc11c7e94b397c6ec763d3d1dc455ee0c3b1c20e56e40cf6e79d3d7e1d897dd02f43852c1721047c72ec7963be4d130f1d40ed9d3de58d520e07d456
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exeFilesize
340KB
MD5db69a53184dd6aa861e9f83469a0fcee
SHA19943477240ec918a39816ea32c6c9b8b5689ca4b
SHA256610ffa272a80b6ffcf75f243906a750ef3f70669f82644d34ee64adc4f1d2711
SHA5129fcd5cd4a19ee9fc0e04112d7dbedbe3ca7f960552f19d71efd7f4368fc16ef6285e2de2f785891911c142c23220c9cf1daaa94a4cd08f67e463d0917f76346d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exeFilesize
340KB
MD5db69a53184dd6aa861e9f83469a0fcee
SHA19943477240ec918a39816ea32c6c9b8b5689ca4b
SHA256610ffa272a80b6ffcf75f243906a750ef3f70669f82644d34ee64adc4f1d2711
SHA5129fcd5cd4a19ee9fc0e04112d7dbedbe3ca7f960552f19d71efd7f4368fc16ef6285e2de2f785891911c142c23220c9cf1daaa94a4cd08f67e463d0917f76346d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4768.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4768.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
C:\Users\Admin\AppData\Local\Temp\Tar78C0.tmpFilesize
161KB
MD5be2bec6e8c5653136d3e72fe53c98aa3
SHA1a8182d6db17c14671c3d5766c72e58d87c0810de
SHA2561919aab2a820642490169bdc4e88bd1189e22f83e7498bf8ebdfb62ec7d843fd
SHA5120d1424ccdf0d53faf3f4e13d534e12f22388648aa4c23edbc503801e3c96b7f73c7999b760b5bef4b5e9dd923dffe21a21889b1ce836dd428420bf0f4f5327ff
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\ZwHNBZLJVTXPBMLXLFKOI.Admin\System\Apps.txtFilesize
5KB
MD5a1e09ee58912bb4d23164908895272d2
SHA1bd24a363a082a1cc95614005a5cb55bf28a8d7e8
SHA256ec75150471b343ccc81c11a3c4a1dd18255666f6e72cd1544282b76c3a33017c
SHA5127fd9322f342b384b15ecf53030e1ea264bd037e181823a0fc6adea0d5bc7682be40f4013ca2c9d68e233f600089d6af5d91d809f8360be2a98f33929b2c37de9
-
C:\Users\Admin\AppData\Roaming\ZwHNBZLJVTXPBMLXLFKOI.Admin\System\Process.txtFilesize
1KB
MD564174df4dcd30d9432e809193af19c94
SHA1513b1b0249931d0c1cd9a5028b13a5fc61711dfa
SHA2560fbc533f8ff7baf9a51c90611f5ae0e834f995edf57bdb11504268086e2d43dd
SHA51274cfc10192bbbbf2aff00d77ec02b5840777a2f949ade751790bc9fa121dcfeadb1ad6c72210872b1c1ace28f802ee2ca09b291d935b92fe7ce63c615eb3f84c
-
C:\Users\Admin\AppData\Roaming\ZwHNBZLJVTXPBMLXLFKOI.Admin\System\Process.txtFilesize
1KB
MD57471bfa451dbce1304190e4e62b6d8db
SHA1d20808d6081d6fcd9297964f2542ed908377a5b2
SHA2568077066b28c29daba23ad5ac2e3f54cdb3533a1826199fc783ff7b7d7f61d204
SHA5122c8a09cdc3c032adeee5c0f32300f094eb34ddaa30bf4b28266da19966a2b46fae9df3a11a437f97897dc985393f116c7b7c8d4241a4c0fb40537ceac2ad0e7a
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\y86tu48.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exeFilesize
829KB
MD59bea9d1a577e90ce387958c1507b0918
SHA1b7579a4fe32afd8cc5e61a3363f8552249b8a42b
SHA256f69aced34f60ab9fb4b4a298f4889381733932dcff96577282bb5fb6140aec2e
SHA5123224ff1926fe706d364c3670e63392277cd704e17d04c2d5b113950c271fa953a0f3ce153ea09ff905bfcbb002485c15436a2fb66097d3dd6f97d877bbcadeff
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap5766.exeFilesize
829KB
MD59bea9d1a577e90ce387958c1507b0918
SHA1b7579a4fe32afd8cc5e61a3363f8552249b8a42b
SHA256f69aced34f60ab9fb4b4a298f4889381733932dcff96577282bb5fb6140aec2e
SHA5123224ff1926fe706d364c3670e63392277cd704e17d04c2d5b113950c271fa953a0f3ce153ea09ff905bfcbb002485c15436a2fb66097d3dd6f97d877bbcadeff
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\xAPed82.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exeFilesize
687KB
MD507f05ba4795888230a232c52605fa4f1
SHA171162b41a85670c734f87b9f91919c26edfb2beb
SHA2562fda4e170a0ef722e22c8dda3ad79c8c39251fe83db7e119b02b883d30f7e6ec
SHA5121f00d611cc11c7e94b397c6ec763d3d1dc455ee0c3b1c20e56e40cf6e79d3d7e1d897dd02f43852c1721047c72ec7963be4d130f1d40ed9d3de58d520e07d456
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4075.exeFilesize
687KB
MD507f05ba4795888230a232c52605fa4f1
SHA171162b41a85670c734f87b9f91919c26edfb2beb
SHA2562fda4e170a0ef722e22c8dda3ad79c8c39251fe83db7e119b02b883d30f7e6ec
SHA5121f00d611cc11c7e94b397c6ec763d3d1dc455ee0c3b1c20e56e40cf6e79d3d7e1d897dd02f43852c1721047c72ec7963be4d130f1d40ed9d3de58d520e07d456
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\w05AV57.exeFilesize
357KB
MD5d8c72a55085bc5caabcbafe552b02e2b
SHA1a433d3ad1a180e0d64d4175c84d942f5b506cc7a
SHA2564fb07143a13cce5cd71e21b3988b048ad05d2364e33f445dbc87615827eb00fc
SHA512fb1d669e10dd1eef7bdd6da413c3eedf6a3c40b949ff0fcfcc5a4d408aba6f21256bd987eab786588ab741d152470849765f6c675c975d41e1e09624631637be
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exeFilesize
340KB
MD5db69a53184dd6aa861e9f83469a0fcee
SHA19943477240ec918a39816ea32c6c9b8b5689ca4b
SHA256610ffa272a80b6ffcf75f243906a750ef3f70669f82644d34ee64adc4f1d2711
SHA5129fcd5cd4a19ee9fc0e04112d7dbedbe3ca7f960552f19d71efd7f4368fc16ef6285e2de2f785891911c142c23220c9cf1daaa94a4cd08f67e463d0917f76346d
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap2174.exeFilesize
340KB
MD5db69a53184dd6aa861e9f83469a0fcee
SHA19943477240ec918a39816ea32c6c9b8b5689ca4b
SHA256610ffa272a80b6ffcf75f243906a750ef3f70669f82644d34ee64adc4f1d2711
SHA5129fcd5cd4a19ee9fc0e04112d7dbedbe3ca7f960552f19d71efd7f4368fc16ef6285e2de2f785891911c142c23220c9cf1daaa94a4cd08f67e463d0917f76346d
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz4768.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
\Users\Admin\AppData\Local\Temp\IXP003.TMP\v6855WI.exeFilesize
298KB
MD5a58945177e3e75e3016fbfe540953af0
SHA18cf2a371da631755af9ece5d6f17f1d252e16ba5
SHA25643e20bd504ad83faffec9e6861f7575d941792b96de57f79fca0fa3e8a4488d4
SHA5126d9f5234488f4304dc5cdea2287519dc7651f60cdfc6d96ba652effbce8f99fca9de62a105fe2c135dfd8bae90c958e369934883072c168629f4cf0cb2e43793
-
\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
memory/292-1362-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/292-1382-0x0000000004FD0000-0x0000000005010000-memory.dmpFilesize
256KB
-
memory/936-1165-0x0000000000B70000-0x0000000000BB0000-memory.dmpFilesize
256KB
-
memory/936-1139-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1112-149-0x0000000004820000-0x0000000004866000-memory.dmpFilesize
280KB
-
memory/1112-166-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-170-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-178-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-187-0x00000000072C0000-0x0000000007300000-memory.dmpFilesize
256KB
-
memory/1112-188-0x00000000072C0000-0x0000000007300000-memory.dmpFilesize
256KB
-
memory/1112-184-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-182-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-180-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-176-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-174-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-172-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-168-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-1059-0x00000000072C0000-0x0000000007300000-memory.dmpFilesize
256KB
-
memory/1112-164-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-162-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-160-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-158-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-156-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-148-0x0000000000360000-0x00000000003AB000-memory.dmpFilesize
300KB
-
memory/1112-154-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-150-0x00000000048B0000-0x00000000048F4000-memory.dmpFilesize
272KB
-
memory/1112-151-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1112-152-0x00000000048B0000-0x00000000048EF000-memory.dmpFilesize
252KB
-
memory/1204-1111-0x0000000002560000-0x00000000025A0000-memory.dmpFilesize
256KB
-
memory/1204-1109-0x0000000000C50000-0x0000000000D36000-memory.dmpFilesize
920KB
-
memory/1284-1155-0x0000000000720000-0x000000000072E000-memory.dmpFilesize
56KB
-
memory/1284-1149-0x00000000001B0000-0x00000000001F0000-memory.dmpFilesize
256KB
-
memory/1284-1386-0x0000000002110000-0x0000000002190000-memory.dmpFilesize
512KB
-
memory/1284-1383-0x0000000002110000-0x0000000002190000-memory.dmpFilesize
512KB
-
memory/1284-1294-0x0000000002110000-0x0000000002190000-memory.dmpFilesize
512KB
-
memory/1284-1187-0x000000001A890000-0x000000001A89E000-memory.dmpFilesize
56KB
-
memory/1284-1186-0x000000001B010000-0x000000001B07E000-memory.dmpFilesize
440KB
-
memory/1284-1185-0x000000001A880000-0x000000001A88E000-memory.dmpFilesize
56KB
-
memory/1284-1184-0x00000000023C0000-0x0000000002400000-memory.dmpFilesize
256KB
-
memory/1284-1154-0x0000000002020000-0x000000000203A000-memory.dmpFilesize
104KB
-
memory/1284-1153-0x0000000002110000-0x0000000002190000-memory.dmpFilesize
512KB
-
memory/1284-1152-0x0000000000520000-0x0000000000526000-memory.dmpFilesize
24KB
-
memory/1284-1151-0x00000000006D0000-0x0000000000702000-memory.dmpFilesize
200KB
-
memory/1284-1150-0x0000000000510000-0x0000000000516000-memory.dmpFilesize
24KB
-
memory/1408-118-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-110-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-106-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-105-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-128-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-130-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-126-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-132-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-133-0x0000000000280000-0x00000000002AD000-memory.dmpFilesize
180KB
-
memory/1408-134-0x0000000007170000-0x00000000071B0000-memory.dmpFilesize
256KB
-
memory/1408-135-0x0000000007170000-0x00000000071B0000-memory.dmpFilesize
256KB
-
memory/1408-120-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-136-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/1408-137-0x0000000000400000-0x0000000002B79000-memory.dmpFilesize
39.5MB
-
memory/1408-124-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-103-0x0000000003140000-0x000000000315A000-memory.dmpFilesize
104KB
-
memory/1408-104-0x0000000004660000-0x0000000004678000-memory.dmpFilesize
96KB
-
memory/1408-112-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-114-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-108-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-122-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1408-116-0x0000000004660000-0x0000000004672000-memory.dmpFilesize
72KB
-
memory/1680-92-0x0000000000990000-0x000000000099A000-memory.dmpFilesize
40KB
-
memory/1860-1069-0x0000000004EA0000-0x0000000004EE0000-memory.dmpFilesize
256KB
-
memory/1860-1068-0x00000000002B0000-0x00000000002E2000-memory.dmpFilesize
200KB
-
memory/1876-1164-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1132-0x00000000004C0000-0x00000000004D8000-memory.dmpFilesize
96KB
-
memory/1876-1141-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1183-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1163-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1128-0x0000000000330000-0x0000000000470000-memory.dmpFilesize
1.2MB
-
memory/1876-1157-0x0000000000D50000-0x0000000000D56000-memory.dmpFilesize
24KB
-
memory/1876-1156-0x0000000000E90000-0x0000000000EAA000-memory.dmpFilesize
104KB
-
memory/1876-1140-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1142-0x0000000005440000-0x0000000005480000-memory.dmpFilesize
256KB
-
memory/1876-1130-0x0000000000470000-0x00000000004BA000-memory.dmpFilesize
296KB
-
memory/1876-1129-0x0000000004A60000-0x0000000004FC2000-memory.dmpFilesize
5.4MB