Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-03-2023 18:28
Static task
static1
General
-
Target
5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe
-
Size
1.0MB
-
MD5
41a2664c1c3fb2e9f9401bab8fcb32a7
-
SHA1
c20da73b37abc2e2779b3eecdea473bb86eac0c4
-
SHA256
5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6
-
SHA512
21227d3368ac0e7144864c003a0dcd3a6a9ce141e47d5112a66d0582d09410058ea32340cd90e121bf778f200128400df2f95b8c8e3f806e433371645dc672d9
-
SSDEEP
12288:FMr5y90O5F6Wk9Ee6O2Sm/Igw1RtK4BMmmMWZHFOKzmNUJBcjRuvVdRGlN+5R84r:syPFNaDmB4tITZla+x3cdnovPd
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
redline
Anh123
199.115.193.116:11300
-
auth_value
db990971ec3911c24ea05eeccc2e1f60
Extracted
redline
Cong
199.115.193.171:48258
-
auth_value
aecbeec46b8431628af8ba12e4621a71
Signatures
-
Processes:
v0429FV.exetz2842.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz2842.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz2842.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz2842.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz2842.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz2842.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4752-195-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/4752-196-0x0000000007660000-0x00000000076A4000-memory.dmp family_redline behavioral1/memory/4752-197-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-198-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-204-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-200-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-208-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-210-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-212-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-214-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-216-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-218-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-220-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-222-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-224-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-226-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-228-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-230-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-232-0x0000000007660000-0x000000000769F000-memory.dmp family_redline behavioral1/memory/4752-234-0x0000000007660000-0x000000000769F000-memory.dmp family_redline -
Downloads MZ/PE file
-
Executes dropped EXE 16 IoCs
Processes:
zap1688.exezap0557.exezap0088.exetz2842.exev0429FV.exew81JS22.exexGAvm13.exey77SA40.exelegenda.exeNasalized.exe76783.exeBlaubok.exeNasalized.exeBlaubok.exebuild.exelegenda.exepid process 4116 zap1688.exe 1844 zap0557.exe 2140 zap0088.exe 2068 tz2842.exe 4108 v0429FV.exe 4752 w81JS22.exe 4700 xGAvm13.exe 3996 y77SA40.exe 1880 legenda.exe 668 Nasalized.exe 1608 76783.exe 2552 Blaubok.exe 1576 Nasalized.exe 4280 Blaubok.exe 4052 build.exe 4720 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4832 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
v0429FV.exetz2842.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v0429FV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz2842.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap0088.exe5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exezap1688.exezap0557.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0088.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap0088.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap1688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap1688.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0557.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap0557.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
Nasalized.exeBlaubok.exe76783.exedescription pid process target process PID 668 set thread context of 1576 668 Nasalized.exe Nasalized.exe PID 2552 set thread context of 4280 2552 Blaubok.exe Blaubok.exe PID 1608 set thread context of 4120 1608 76783.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tz2842.exev0429FV.exew81JS22.exexGAvm13.exe76783.exepid process 2068 tz2842.exe 2068 tz2842.exe 4108 v0429FV.exe 4108 v0429FV.exe 4752 w81JS22.exe 4752 w81JS22.exe 4700 xGAvm13.exe 4700 xGAvm13.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe 1608 76783.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
tz2842.exev0429FV.exew81JS22.exexGAvm13.exe76783.exeNasalized.exebuild.exeBlaubok.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 2068 tz2842.exe Token: SeDebugPrivilege 4108 v0429FV.exe Token: SeDebugPrivilege 4752 w81JS22.exe Token: SeDebugPrivilege 4700 xGAvm13.exe Token: SeDebugPrivilege 1608 76783.exe Token: SeDebugPrivilege 1576 Nasalized.exe Token: SeDebugPrivilege 4052 build.exe Token: SeDebugPrivilege 4280 Blaubok.exe Token: SeDebugPrivilege 4120 InstallUtil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exezap1688.exezap0557.exezap0088.exey77SA40.exelegenda.execmd.exeNasalized.exeBlaubok.exedescription pid process target process PID 3992 wrote to memory of 4116 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe zap1688.exe PID 3992 wrote to memory of 4116 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe zap1688.exe PID 3992 wrote to memory of 4116 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe zap1688.exe PID 4116 wrote to memory of 1844 4116 zap1688.exe zap0557.exe PID 4116 wrote to memory of 1844 4116 zap1688.exe zap0557.exe PID 4116 wrote to memory of 1844 4116 zap1688.exe zap0557.exe PID 1844 wrote to memory of 2140 1844 zap0557.exe zap0088.exe PID 1844 wrote to memory of 2140 1844 zap0557.exe zap0088.exe PID 1844 wrote to memory of 2140 1844 zap0557.exe zap0088.exe PID 2140 wrote to memory of 2068 2140 zap0088.exe tz2842.exe PID 2140 wrote to memory of 2068 2140 zap0088.exe tz2842.exe PID 2140 wrote to memory of 4108 2140 zap0088.exe v0429FV.exe PID 2140 wrote to memory of 4108 2140 zap0088.exe v0429FV.exe PID 2140 wrote to memory of 4108 2140 zap0088.exe v0429FV.exe PID 1844 wrote to memory of 4752 1844 zap0557.exe w81JS22.exe PID 1844 wrote to memory of 4752 1844 zap0557.exe w81JS22.exe PID 1844 wrote to memory of 4752 1844 zap0557.exe w81JS22.exe PID 4116 wrote to memory of 4700 4116 zap1688.exe xGAvm13.exe PID 4116 wrote to memory of 4700 4116 zap1688.exe xGAvm13.exe PID 4116 wrote to memory of 4700 4116 zap1688.exe xGAvm13.exe PID 3992 wrote to memory of 3996 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe y77SA40.exe PID 3992 wrote to memory of 3996 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe y77SA40.exe PID 3992 wrote to memory of 3996 3992 5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe y77SA40.exe PID 3996 wrote to memory of 1880 3996 y77SA40.exe legenda.exe PID 3996 wrote to memory of 1880 3996 y77SA40.exe legenda.exe PID 3996 wrote to memory of 1880 3996 y77SA40.exe legenda.exe PID 1880 wrote to memory of 4956 1880 legenda.exe schtasks.exe PID 1880 wrote to memory of 4956 1880 legenda.exe schtasks.exe PID 1880 wrote to memory of 4956 1880 legenda.exe schtasks.exe PID 1880 wrote to memory of 4916 1880 legenda.exe cmd.exe PID 1880 wrote to memory of 4916 1880 legenda.exe cmd.exe PID 1880 wrote to memory of 4916 1880 legenda.exe cmd.exe PID 4916 wrote to memory of 4852 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 4852 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 4852 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 768 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 768 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 768 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 832 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 832 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 832 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 844 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 844 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 844 4916 cmd.exe cmd.exe PID 4916 wrote to memory of 776 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 776 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 776 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 4296 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 4296 4916 cmd.exe cacls.exe PID 4916 wrote to memory of 4296 4916 cmd.exe cacls.exe PID 1880 wrote to memory of 668 1880 legenda.exe Nasalized.exe PID 1880 wrote to memory of 668 1880 legenda.exe Nasalized.exe PID 1880 wrote to memory of 668 1880 legenda.exe Nasalized.exe PID 668 wrote to memory of 1576 668 Nasalized.exe Nasalized.exe PID 668 wrote to memory of 1576 668 Nasalized.exe Nasalized.exe PID 668 wrote to memory of 1576 668 Nasalized.exe Nasalized.exe PID 1880 wrote to memory of 1608 1880 legenda.exe 76783.exe PID 1880 wrote to memory of 1608 1880 legenda.exe 76783.exe PID 1880 wrote to memory of 1608 1880 legenda.exe 76783.exe PID 1880 wrote to memory of 2552 1880 legenda.exe Blaubok.exe PID 1880 wrote to memory of 2552 1880 legenda.exe Blaubok.exe PID 1880 wrote to memory of 2552 1880 legenda.exe Blaubok.exe PID 2552 wrote to memory of 4280 2552 Blaubok.exe Blaubok.exe PID 2552 wrote to memory of 4280 2552 Blaubok.exe Blaubok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe"C:\Users\Admin\AppData\Local\Temp\5dfb8106baf120e7abd9e77fec494a8972bdd097d875e5f3f62749ed4825a0c6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0557.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0557.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0088.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0088.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2842.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2842.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0429FV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0429FV.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81JS22.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81JS22.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGAvm13.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGAvm13.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y77SA40.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y77SA40.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeC:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe"C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeC:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Blaubok.exe.logFilesize
1KB
MD58268d0ebb3b023f56d9a27f3933f124f
SHA1def43e831ca0fcbc1df8a1e11a41fe3ea1734f3b
SHA2562fdfee92c5ce81220a0b66cf0ec1411c923d48ae89232406c237e1bc5204392d
SHA512c61c2f8df84e4bbcb6f871befd4dde44188cf106c4af91a56b33a45692b83d1c52a953477f14f4239726b66ecab66842e910c2996631137355a4aba4ea793c97
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Nasalized.exe.logFilesize
1KB
MD5be1788135df70eb012f684bc8237162a
SHA1b2e0403661c14563fd48d8bb0d41ae2bcfbf3d36
SHA25688138ab6e758402a1a8c6c0249d7b8df1c1c47c5f9363b870cd4c23a45806506
SHA5121a7c633e2492066b1dae1bd90402e1345397dba876e955400c84eda6dfde0894b098487235ee5d096aae6cfc66cdefcf649c6484b669bcdbc85059ed9e8ca2a2
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000155001\Nasalized.exeFilesize
898KB
MD54c42520a02966a874eb4fbdc0a74e208
SHA18c17320204683ca1dcf81c0a031a6e6c0d679d84
SHA2560c71cf525042e6cd8d338248d66081495cbf35be2f28d515965fa15f1ad7432d
SHA512c9891c1a8428ba8ece0880c725a8fbbc0a77573f3460c35eeb7385c6993712fd35143b9662599d09f25af36f30ff856b32ae085161b1baa431aa428ecd5ea512
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y77SA40.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y77SA40.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1688.exeFilesize
857KB
MD541142f457771dbdced77ba6523b51543
SHA17a973b9ddc92341db2b2debbcf9b250dfa1ade3b
SHA256b743da5508a84d3c1b80b9ac8e0a775cc0d28378a2421f22cc9174a9c697a0cf
SHA512a19069ec9c36c9a875239d8e86cd113b3a0ae9364156530357ab8aaaec9ac748e4215635caa5b89db44cf2292080be3c642f3ba760a071f69af165ec6cce336f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1688.exeFilesize
857KB
MD541142f457771dbdced77ba6523b51543
SHA17a973b9ddc92341db2b2debbcf9b250dfa1ade3b
SHA256b743da5508a84d3c1b80b9ac8e0a775cc0d28378a2421f22cc9174a9c697a0cf
SHA512a19069ec9c36c9a875239d8e86cd113b3a0ae9364156530357ab8aaaec9ac748e4215635caa5b89db44cf2292080be3c642f3ba760a071f69af165ec6cce336f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGAvm13.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xGAvm13.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0557.exeFilesize
715KB
MD5cedcc2ce29b2599ffdde8807a209d60e
SHA1713099cd184f12499fbf3a0096fd17b55063f38c
SHA256be48aad1cfe86198cbf723e04750507bb85f941ac844464d17a772a4b343db61
SHA512717cf5a71a23c78ce98a114f38c3aeecc6b45d245027ae4d84303b0382a8e2e7d088b38f0faa319b232e757ba2abc4fa5de7c74ed4513367720b8e9483ffcac8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0557.exeFilesize
715KB
MD5cedcc2ce29b2599ffdde8807a209d60e
SHA1713099cd184f12499fbf3a0096fd17b55063f38c
SHA256be48aad1cfe86198cbf723e04750507bb85f941ac844464d17a772a4b343db61
SHA512717cf5a71a23c78ce98a114f38c3aeecc6b45d245027ae4d84303b0382a8e2e7d088b38f0faa319b232e757ba2abc4fa5de7c74ed4513367720b8e9483ffcac8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81JS22.exeFilesize
386KB
MD53741dd1eb891a744f5ab047f9425ecf3
SHA1c85a2b08c7c172331bb8dfcb1da4dfe008f3cd6d
SHA2560439622e765b42fc1ac7427d90feb8d82eade3024cb4ed7b1d4c78be94c70ceb
SHA512193fc39b6a2e8d722740d9e4a229c656eeacb90df36210dabab87295598973751552abc692a2a1a3c0349f437bec61343c20c79cd2a7cd6ee84e0a9db9e33b3c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w81JS22.exeFilesize
386KB
MD53741dd1eb891a744f5ab047f9425ecf3
SHA1c85a2b08c7c172331bb8dfcb1da4dfe008f3cd6d
SHA2560439622e765b42fc1ac7427d90feb8d82eade3024cb4ed7b1d4c78be94c70ceb
SHA512193fc39b6a2e8d722740d9e4a229c656eeacb90df36210dabab87295598973751552abc692a2a1a3c0349f437bec61343c20c79cd2a7cd6ee84e0a9db9e33b3c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0088.exeFilesize
355KB
MD5e8040970793658dce7006a37c9d58f46
SHA1ecdd5eb57fae5529a525e30fb73cda9d5de202ee
SHA25678f93b0bd435a7eb489d6bbba127a7b43a99c8db766164ac4f36bae575a55551
SHA512d2f8d0a731bdacf4abd218bce28da91e98c71dc5e35aef492b248a0ab3ff35893e04a1b8b5371b303bdc176195a60721890c7c3eb3d5f2d7c3cafa91ba96089b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0088.exeFilesize
355KB
MD5e8040970793658dce7006a37c9d58f46
SHA1ecdd5eb57fae5529a525e30fb73cda9d5de202ee
SHA25678f93b0bd435a7eb489d6bbba127a7b43a99c8db766164ac4f36bae575a55551
SHA512d2f8d0a731bdacf4abd218bce28da91e98c71dc5e35aef492b248a0ab3ff35893e04a1b8b5371b303bdc176195a60721890c7c3eb3d5f2d7c3cafa91ba96089b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2842.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2842.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0429FV.exeFilesize
328KB
MD56d45a1890e9ba2ba52d939cc3df7f683
SHA16e156f6acd49bc9ac05dd73d9ca7433d7c4a711d
SHA256175642e52d02fe40dcbd4704fd2e6719d64c0b40255b22d8e55e6fe9b1483325
SHA51257ed8e053b93f33a089c0b4cdafa7b201ec3e5d147b0f3c3f0da5a77142b9aa5f8ae6a3c971e8d33cd8fc3e7c964c4dd7a828934376862bd2bb71bfc7c14498d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0429FV.exeFilesize
328KB
MD56d45a1890e9ba2ba52d939cc3df7f683
SHA16e156f6acd49bc9ac05dd73d9ca7433d7c4a711d
SHA256175642e52d02fe40dcbd4704fd2e6719d64c0b40255b22d8e55e6fe9b1483325
SHA51257ed8e053b93f33a089c0b4cdafa7b201ec3e5d147b0f3c3f0da5a77142b9aa5f8ae6a3c971e8d33cd8fc3e7c964c4dd7a828934376862bd2bb71bfc7c14498d
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
memory/668-1158-0x00000000057C0000-0x00000000057D0000-memory.dmpFilesize
64KB
-
memory/668-1157-0x0000000005870000-0x0000000005BC0000-memory.dmpFilesize
3.3MB
-
memory/668-1156-0x0000000000DE0000-0x0000000000EC6000-memory.dmpFilesize
920KB
-
memory/1576-1198-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/1576-1199-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB
-
memory/1576-1200-0x0000000005130000-0x000000000517B000-memory.dmpFilesize
300KB
-
memory/1576-1210-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB
-
memory/1608-1173-0x0000000006280000-0x00000000067E2000-memory.dmpFilesize
5.4MB
-
memory/1608-1201-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/1608-1175-0x0000000005710000-0x000000000575A000-memory.dmpFilesize
296KB
-
memory/1608-1172-0x0000000000260000-0x00000000003A0000-memory.dmpFilesize
1.2MB
-
memory/1608-1211-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/1608-1190-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/1608-1209-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/1608-1192-0x00000000057A0000-0x00000000057B8000-memory.dmpFilesize
96KB
-
memory/1608-1193-0x0000000005DF0000-0x0000000005DFA000-memory.dmpFilesize
40KB
-
memory/1608-1174-0x0000000005D10000-0x0000000005DAC000-memory.dmpFilesize
624KB
-
memory/1608-1208-0x0000000002DC0000-0x0000000002DD0000-memory.dmpFilesize
64KB
-
memory/2068-144-0x00000000005D0000-0x00000000005DA000-memory.dmpFilesize
40KB
-
memory/2552-1191-0x00000000053E0000-0x00000000053F0000-memory.dmpFilesize
64KB
-
memory/2552-1189-0x0000000000A50000-0x0000000000B36000-memory.dmpFilesize
920KB
-
memory/4052-1217-0x0000000000E20000-0x0000000000E60000-memory.dmpFilesize
256KB
-
memory/4052-1218-0x0000000002E40000-0x0000000002E46000-memory.dmpFilesize
24KB
-
memory/4052-1219-0x0000000002E80000-0x0000000002EB2000-memory.dmpFilesize
200KB
-
memory/4052-1220-0x0000000002E50000-0x0000000002E56000-memory.dmpFilesize
24KB
-
memory/4052-1221-0x0000000002EB0000-0x0000000002ECA000-memory.dmpFilesize
104KB
-
memory/4108-186-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-168-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-150-0x0000000004B20000-0x0000000004B3A000-memory.dmpFilesize
104KB
-
memory/4108-151-0x0000000007060000-0x000000000755E000-memory.dmpFilesize
5.0MB
-
memory/4108-153-0x00000000075B0000-0x00000000075C8000-memory.dmpFilesize
96KB
-
memory/4108-152-0x0000000002C50000-0x0000000002C7D000-memory.dmpFilesize
180KB
-
memory/4108-155-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-156-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-154-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-157-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-158-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-160-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-162-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-164-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-166-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-190-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/4108-170-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-172-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-188-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-174-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-187-0x00000000047E0000-0x00000000047F0000-memory.dmpFilesize
64KB
-
memory/4108-176-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-178-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-180-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-182-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-184-0x00000000075B0000-0x00000000075C2000-memory.dmpFilesize
72KB
-
memory/4108-185-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/4280-1206-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4280-1207-0x0000000004F60000-0x0000000004F70000-memory.dmpFilesize
64KB
-
memory/4700-1131-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/4700-1132-0x0000000004C90000-0x0000000004CA0000-memory.dmpFilesize
64KB
-
memory/4700-1129-0x0000000000430000-0x0000000000462000-memory.dmpFilesize
200KB
-
memory/4700-1130-0x0000000004E70000-0x0000000004EBB000-memory.dmpFilesize
300KB
-
memory/4752-228-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-1116-0x0000000008A70000-0x0000000008C32000-memory.dmpFilesize
1.8MB
-
memory/4752-208-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-207-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-200-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-204-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-230-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-202-0x0000000002C60000-0x0000000002CAB000-memory.dmpFilesize
300KB
-
memory/4752-198-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-197-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-196-0x0000000007660000-0x00000000076A4000-memory.dmpFilesize
272KB
-
memory/4752-195-0x0000000004A10000-0x0000000004A56000-memory.dmpFilesize
280KB
-
memory/4752-218-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-220-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-222-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-224-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-226-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-234-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-203-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-205-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-216-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-210-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-1109-0x00000000079A0000-0x00000000079B2000-memory.dmpFilesize
72KB
-
memory/4752-212-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-214-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-1107-0x0000000007DF0000-0x00000000083F6000-memory.dmpFilesize
6.0MB
-
memory/4752-1108-0x0000000007860000-0x000000000796A000-memory.dmpFilesize
1.0MB
-
memory/4752-1123-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-1122-0x0000000009550000-0x00000000095A0000-memory.dmpFilesize
320KB
-
memory/4752-1121-0x00000000094D0000-0x0000000009546000-memory.dmpFilesize
472KB
-
memory/4752-1120-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-1119-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-1118-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-1117-0x0000000008C40000-0x000000000916C000-memory.dmpFilesize
5.2MB
-
memory/4752-232-0x0000000007660000-0x000000000769F000-memory.dmpFilesize
252KB
-
memory/4752-1115-0x0000000008980000-0x0000000008A12000-memory.dmpFilesize
584KB
-
memory/4752-1114-0x0000000007CA0000-0x0000000007D06000-memory.dmpFilesize
408KB
-
memory/4752-1112-0x0000000007B10000-0x0000000007B5B000-memory.dmpFilesize
300KB
-
memory/4752-1111-0x0000000002E80000-0x0000000002E90000-memory.dmpFilesize
64KB
-
memory/4752-1110-0x00000000079C0000-0x00000000079FE000-memory.dmpFilesize
248KB