Analysis
-
max time kernel
115s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-03-2023 19:37
Static task
static1
General
-
Target
e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe
-
Size
1.0MB
-
MD5
b9e6b4195787ce8f705e553472bb1302
-
SHA1
70e00844b3b15762d5144b49df36f09e5c2912eb
-
SHA256
e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed
-
SHA512
803a6816ec070689b7a21d927687a2c7da4e80e514a949d88d7e191e0b1d2cd9119d1d5a84d1334cdf8586c339c5b1c934ea24ab086cd92674e5b15d80cc6873
-
SSDEEP
12288:9Mruy90cbv1VSW3rBk6LOWN7mdpivqjHplmwiitGQ/qfpcSEdpN+hgY7JR7FTR76:Hyp18W3rxphupOUJnhtAS3mFTR70k/0
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Extracted
redline
lida
193.233.20.32:4125
-
auth_value
24052aa2e9b85984a98d80cf08623e8d
Extracted
amadey
3.68
62.204.41.87/joomla/index.php
Extracted
aurora
212.87.204.93:8081
Extracted
redline
Cong
199.115.193.171:48258
-
auth_value
aecbeec46b8431628af8ba12e4621a71
Extracted
redline
whitedoc
81.161.229.143:45156
-
auth_value
2020d22aaa2ecafa1b12e00dfcffae03
Signatures
-
Processes:
v2006fv.exetz5619.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2006fv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2006fv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5619.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v2006fv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5619.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2006fv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2006fv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2006fv.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
Processes:
resource yara_rule behavioral1/memory/5008-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-219-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-223-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-229-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-231-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-233-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-235-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-237-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-239-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-241-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-243-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-245-0x0000000004CF0000-0x0000000004D2F000-memory.dmp family_redline behavioral1/memory/5008-420-0x0000000004A40000-0x0000000004A50000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
76783.exey00rU46.exelegenda.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 76783.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation y00rU46.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation legenda.exe -
Executes dropped EXE 15 IoCs
Processes:
zap0130.exezap4064.exezap7020.exetz5619.exev2006fv.exew57MV53.exexmnzf04.exey00rU46.exelegenda.exe76783.exeBlaubok.exeagent.exeBlaubok.exebuild.exelegenda.exepid process 816 zap0130.exe 1656 zap4064.exe 4536 zap7020.exe 1556 tz5619.exe 4736 v2006fv.exe 5008 w57MV53.exe 2184 xmnzf04.exe 4392 y00rU46.exe 3052 legenda.exe 2044 76783.exe 4180 Blaubok.exe 3372 agent.exe 4248 Blaubok.exe 4624 build.exe 1792 legenda.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 2512 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz5619.exev2006fv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5619.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2006fv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2006fv.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap0130.exezap4064.exezap7020.exee11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap0130.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap4064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap4064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap7020.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0130.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 2 IoCs
Processes:
Blaubok.exe76783.exedescription pid process target process PID 4180 set thread context of 4248 4180 Blaubok.exe Blaubok.exe PID 2044 set thread context of 1908 2044 76783.exe InstallUtil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4776 4736 WerFault.exe v2006fv.exe 4412 5008 WerFault.exe w57MV53.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tz5619.exev2006fv.exew57MV53.exexmnzf04.exe76783.exepid process 1556 tz5619.exe 1556 tz5619.exe 4736 v2006fv.exe 4736 v2006fv.exe 5008 w57MV53.exe 5008 w57MV53.exe 2184 xmnzf04.exe 2184 xmnzf04.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe 2044 76783.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
tz5619.exev2006fv.exew57MV53.exexmnzf04.exe76783.exeBlaubok.exebuild.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 1556 tz5619.exe Token: SeDebugPrivilege 4736 v2006fv.exe Token: SeDebugPrivilege 5008 w57MV53.exe Token: SeDebugPrivilege 2184 xmnzf04.exe Token: SeDebugPrivilege 2044 76783.exe Token: SeDebugPrivilege 4248 Blaubok.exe Token: SeDebugPrivilege 4624 build.exe Token: SeDebugPrivilege 1908 InstallUtil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exezap0130.exezap4064.exezap7020.exey00rU46.exelegenda.execmd.exeBlaubok.exedescription pid process target process PID 3040 wrote to memory of 816 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe zap0130.exe PID 3040 wrote to memory of 816 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe zap0130.exe PID 3040 wrote to memory of 816 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe zap0130.exe PID 816 wrote to memory of 1656 816 zap0130.exe zap4064.exe PID 816 wrote to memory of 1656 816 zap0130.exe zap4064.exe PID 816 wrote to memory of 1656 816 zap0130.exe zap4064.exe PID 1656 wrote to memory of 4536 1656 zap4064.exe zap7020.exe PID 1656 wrote to memory of 4536 1656 zap4064.exe zap7020.exe PID 1656 wrote to memory of 4536 1656 zap4064.exe zap7020.exe PID 4536 wrote to memory of 1556 4536 zap7020.exe tz5619.exe PID 4536 wrote to memory of 1556 4536 zap7020.exe tz5619.exe PID 4536 wrote to memory of 4736 4536 zap7020.exe v2006fv.exe PID 4536 wrote to memory of 4736 4536 zap7020.exe v2006fv.exe PID 4536 wrote to memory of 4736 4536 zap7020.exe v2006fv.exe PID 1656 wrote to memory of 5008 1656 zap4064.exe w57MV53.exe PID 1656 wrote to memory of 5008 1656 zap4064.exe w57MV53.exe PID 1656 wrote to memory of 5008 1656 zap4064.exe w57MV53.exe PID 816 wrote to memory of 2184 816 zap0130.exe xmnzf04.exe PID 816 wrote to memory of 2184 816 zap0130.exe xmnzf04.exe PID 816 wrote to memory of 2184 816 zap0130.exe xmnzf04.exe PID 3040 wrote to memory of 4392 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe y00rU46.exe PID 3040 wrote to memory of 4392 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe y00rU46.exe PID 3040 wrote to memory of 4392 3040 e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe y00rU46.exe PID 4392 wrote to memory of 3052 4392 y00rU46.exe legenda.exe PID 4392 wrote to memory of 3052 4392 y00rU46.exe legenda.exe PID 4392 wrote to memory of 3052 4392 y00rU46.exe legenda.exe PID 3052 wrote to memory of 5048 3052 legenda.exe schtasks.exe PID 3052 wrote to memory of 5048 3052 legenda.exe schtasks.exe PID 3052 wrote to memory of 5048 3052 legenda.exe schtasks.exe PID 3052 wrote to memory of 4344 3052 legenda.exe cmd.exe PID 3052 wrote to memory of 4344 3052 legenda.exe cmd.exe PID 3052 wrote to memory of 4344 3052 legenda.exe cmd.exe PID 4344 wrote to memory of 3216 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3216 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3216 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3952 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3952 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3952 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3756 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3756 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3756 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3720 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3720 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3720 4344 cmd.exe cmd.exe PID 4344 wrote to memory of 3836 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3836 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 3836 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 4680 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 4680 4344 cmd.exe cacls.exe PID 4344 wrote to memory of 4680 4344 cmd.exe cacls.exe PID 3052 wrote to memory of 2044 3052 legenda.exe 76783.exe PID 3052 wrote to memory of 2044 3052 legenda.exe 76783.exe PID 3052 wrote to memory of 2044 3052 legenda.exe 76783.exe PID 3052 wrote to memory of 4180 3052 legenda.exe Blaubok.exe PID 3052 wrote to memory of 4180 3052 legenda.exe Blaubok.exe PID 3052 wrote to memory of 4180 3052 legenda.exe Blaubok.exe PID 4180 wrote to memory of 4248 4180 Blaubok.exe Blaubok.exe PID 4180 wrote to memory of 4248 4180 Blaubok.exe Blaubok.exe PID 4180 wrote to memory of 4248 4180 Blaubok.exe Blaubok.exe PID 3052 wrote to memory of 3372 3052 legenda.exe agent.exe PID 3052 wrote to memory of 3372 3052 legenda.exe agent.exe PID 3052 wrote to memory of 3372 3052 legenda.exe agent.exe PID 4180 wrote to memory of 4248 4180 Blaubok.exe Blaubok.exe PID 4180 wrote to memory of 4248 4180 Blaubok.exe Blaubok.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe"C:\Users\Admin\AppData\Local\Temp\e11ed716771695900183ea68fa039b0555806fb93fc6d02e53811186e4913eed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0130.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0130.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4064.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7020.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7020.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5619.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5619.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2006fv.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2006fv.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 10886⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57MV53.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57MV53.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 19445⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmnzf04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmnzf04.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y00rU46.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y00rU46.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legenda.exe /TR "C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legenda.exe" /P "Admin:N"&&CACLS "legenda.exe" /P "Admin:R" /E&&echo Y|CACLS "..\f22b669919" /P "Admin:N"&&CACLS "..\f22b669919" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legenda.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\f22b669919" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe"C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeC:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\1000158000\agent.exe"C:\Users\Admin\AppData\Roaming\1000158000\agent.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4736 -ip 47361⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5008 -ip 50081⤵
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeC:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Blaubok.exe.logFilesize
1KB
MD5a3c82409506a33dec1856104ca55cbfd
SHA12e2ba4e4227590f8821002831c5410f7f45fe812
SHA256780a0d4410f5f9798cb573bcd774561d1439987a39b1368d3c890226928cd203
SHA5129621cfd3dab86d964a2bea6b3788fc19a895307962dcc41428741b8a86291f114df722e9017f755f63d53d09b5111e68f05aa505d9c9deae6c4378a87cdfa69f
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000156001\76783.exeFilesize
1.3MB
MD51782e83ab6ad4f8b4b24dc03ee802100
SHA1fcc9e4d3a0b8bc205339f878f83775939acb93e6
SHA256e5d6c6b7449ea4f9931eed975d0fbf40ded3c637bafee5adb4bd4bd7a703f7dd
SHA512ada7fa28dd6a60a5bef1b63ac07e697e14091fe8bd0d569b0b9cb9e5483acf4c650b25d64ec35027a1ec14ef2fb028c7cf7dd2bdb36f1da7acdddb51d4580e35
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\1000157001\Blaubok.exeFilesize
895KB
MD53c62500496bfc4f35d38ddbe71be78c2
SHA14982a2fb4963f1f574a9ee1e5d02c429148c5e70
SHA256dc980114d28ff6a6743bf6951527b33e43ee1e72d254d6a46cc2049ce0eba165
SHA512d71935afa0f1f3e5c6a291b09b20a020ea6b73ec181f22520f0dd35306f9357c229e6dad17956657c935a455403efb308f224444a06821c414d0c395f484cd4c
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y00rU46.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y00rU46.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0130.exeFilesize
857KB
MD5206075f676531442272aff5baa6da4ac
SHA111c1848fe5201d830c64821632d3a6d3a056a5aa
SHA25611dfedd5afe5e16c16c4797441c9fd8ef26c750e6c26fd53c6415eb63939d8c6
SHA51210201a0a039ec6226ceb5ca6706b82402573e65bf00a7b38f60cf418c49b92b6c8e91800ff2f6645042da180331fc38e8a2a7040011afd5bb5985560ad1677ba
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0130.exeFilesize
857KB
MD5206075f676531442272aff5baa6da4ac
SHA111c1848fe5201d830c64821632d3a6d3a056a5aa
SHA25611dfedd5afe5e16c16c4797441c9fd8ef26c750e6c26fd53c6415eb63939d8c6
SHA51210201a0a039ec6226ceb5ca6706b82402573e65bf00a7b38f60cf418c49b92b6c8e91800ff2f6645042da180331fc38e8a2a7040011afd5bb5985560ad1677ba
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmnzf04.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmnzf04.exeFilesize
175KB
MD56b06147bf5fd26306978a93fe83127a4
SHA17b14ff42f4441b985591ef5b7d4cc703f0bbcdfa
SHA25611e6d45ae92fc4505f14f550d01d97a42fba91a999b900daf843251772c755e0
SHA512603007d99e52da5739040fee891c193123dc5741985de1c3dde091dd07e759336ec749312e4ab95d05c1c6681f10e56b4e9aee67d633a97b6aa25c5119f4d6b4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4064.exeFilesize
715KB
MD593de7bdca0c695a44f1059eea2b7ca61
SHA16b2545337c7c967447d5718539b15af453230eaf
SHA256387aad0b84846608665fb2aaa6d3498b1352174fb4373c3ecbc6f356498316ba
SHA512ced3a01da4639ac5779b3300cc02847ef632e2a0905572fe4d4f64797d70c55f4c7f9762a14cf6b097809ec2f21f8eae5af49dd378a65e07e1836ca15e8a47eb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap4064.exeFilesize
715KB
MD593de7bdca0c695a44f1059eea2b7ca61
SHA16b2545337c7c967447d5718539b15af453230eaf
SHA256387aad0b84846608665fb2aaa6d3498b1352174fb4373c3ecbc6f356498316ba
SHA512ced3a01da4639ac5779b3300cc02847ef632e2a0905572fe4d4f64797d70c55f4c7f9762a14cf6b097809ec2f21f8eae5af49dd378a65e07e1836ca15e8a47eb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57MV53.exeFilesize
386KB
MD55bfd7b0572beb05159b270100de30d54
SHA1335a9ec8b5081525fbd512bd2ee890e87a9c786d
SHA2563896b1d66488c162bd24292c5b54836bf6f4bac0965176badba9e471db515ac9
SHA512b91ca076878a6f51a54d198435d2d20c262842a69a015e0f527f73da305f117a1b67b6c68e5701910126d401f14c487ecf9fa0781f18537cff9fc6a13fdd6a35
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w57MV53.exeFilesize
386KB
MD55bfd7b0572beb05159b270100de30d54
SHA1335a9ec8b5081525fbd512bd2ee890e87a9c786d
SHA2563896b1d66488c162bd24292c5b54836bf6f4bac0965176badba9e471db515ac9
SHA512b91ca076878a6f51a54d198435d2d20c262842a69a015e0f527f73da305f117a1b67b6c68e5701910126d401f14c487ecf9fa0781f18537cff9fc6a13fdd6a35
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7020.exeFilesize
354KB
MD54ae1781acd77372a78c3de00c65a21c6
SHA186425927eda2bf1e78ec962665a43a0caed5e85c
SHA2563de4aa52921b1129ffb26fe0fdd4cdc344e2ead31ad2a9f9915b8528d2bc0fda
SHA5124d6e0c5d3a45a0e2224b4970af2e5db3cba356019c43fe6954575288a74fa23ee2c8e3a3c713e52d1f04d8f7bf080a5847e7f5a1b390b9ec1a83447b369627b9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap7020.exeFilesize
354KB
MD54ae1781acd77372a78c3de00c65a21c6
SHA186425927eda2bf1e78ec962665a43a0caed5e85c
SHA2563de4aa52921b1129ffb26fe0fdd4cdc344e2ead31ad2a9f9915b8528d2bc0fda
SHA5124d6e0c5d3a45a0e2224b4970af2e5db3cba356019c43fe6954575288a74fa23ee2c8e3a3c713e52d1f04d8f7bf080a5847e7f5a1b390b9ec1a83447b369627b9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5619.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5619.exeFilesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2006fv.exeFilesize
328KB
MD546991cbfdc3eba3581e91736236b7129
SHA17695dde8bfaccc74fd5ee92384654ed7c2587ae2
SHA2568c3c33638ab480d41e3c4329bd8e353bac3bd05a186917c973bf472061c42fef
SHA5127cfaa130598e38b7ae7dda5e92cd12f733ee0aa1749d03763d81f0a643ea6b74016fdae93edf8638baf006586487cadf26ad047986f8b9f88ba5463bbb6aebb9
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2006fv.exeFilesize
328KB
MD546991cbfdc3eba3581e91736236b7129
SHA17695dde8bfaccc74fd5ee92384654ed7c2587ae2
SHA2568c3c33638ab480d41e3c4329bd8e353bac3bd05a186917c973bf472061c42fef
SHA5127cfaa130598e38b7ae7dda5e92cd12f733ee0aa1749d03763d81f0a643ea6b74016fdae93edf8638baf006586487cadf26ad047986f8b9f88ba5463bbb6aebb9
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Local\Temp\f22b669919\legenda.exeFilesize
235KB
MD55086db99de54fca268169a1c6cf26122
SHA1003f768ffcc99bda5cda1fb966fda8625a8fdc3e
SHA25642873b0c5899f64b5f3205a4f3146210cc63152e529c69d6292b037844c81ec4
SHA51290531b1b984b21ce62290b713ffc07917bbd766eef7d5e6f4c1c68b2fc7d29495cdd5f05fd71fe5107f1614bbb30922dcfb730f50599e44aeaff52c50f46b8b5
-
C:\Users\Admin\AppData\Roaming\1000158000\agent.exeFilesize
3.1MB
MD5ce117b0b7aff5bf55822e7e879b76fe9
SHA195ae4fb73efc7d9fcdd05664ac458787c8280a06
SHA25628f76833c4943138b2a119a8a66b65aff15b7b91b331865ac21b523fdca0f7f7
SHA51290bb0f400822e97bde74bf8f62d67235c948d355e86b21c508f61b793dc9fd5d0444308d947b661e0d51de42f4a93e8cbb1646193db66cd3c5210a385c0ca6e3
-
C:\Users\Admin\AppData\Roaming\1000158000\agent.exeFilesize
3.1MB
MD5ce117b0b7aff5bf55822e7e879b76fe9
SHA195ae4fb73efc7d9fcdd05664ac458787c8280a06
SHA25628f76833c4943138b2a119a8a66b65aff15b7b91b331865ac21b523fdca0f7f7
SHA51290bb0f400822e97bde74bf8f62d67235c948d355e86b21c508f61b793dc9fd5d0444308d947b661e0d51de42f4a93e8cbb1646193db66cd3c5210a385c0ca6e3
-
C:\Users\Admin\AppData\Roaming\1000158000\agent.exeFilesize
3.1MB
MD5ce117b0b7aff5bf55822e7e879b76fe9
SHA195ae4fb73efc7d9fcdd05664ac458787c8280a06
SHA25628f76833c4943138b2a119a8a66b65aff15b7b91b331865ac21b523fdca0f7f7
SHA51290bb0f400822e97bde74bf8f62d67235c948d355e86b21c508f61b793dc9fd5d0444308d947b661e0d51de42f4a93e8cbb1646193db66cd3c5210a385c0ca6e3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\build.exeFilesize
219KB
MD58335af270081d77360614e79069a2c33
SHA14ddbbe796abda834b342f0987df5b72c35fd2717
SHA256f10d06d3709919d84af8c6ca81c85c3e33d501da0f1e36b6c37f04c5e58345c1
SHA512448389132aa57473478a8b44761ae029510ab1ed3828d8c501fe4206317cb18ba5d46660788a5065568fb91c2c6626e74f0d3c41198b518e86336b5e2991648f
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD516cf28ebb6d37dbaba93f18320c6086e
SHA1eae7d4b7a9636329065877aabe8d4f721a26ab25
SHA256c0603ed73299e59dc890ae194c552acd9d8a2aef2e1a9e76346ca672e3b14106
SHA512f8eee1d4142483de223ddbefec43023fd167e41e358bf8994140e2dcc1712f49228dc92e4e237d1df4ffa6c948097a8309c84d60788a03babed668532c438fc2
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
223B
MD594cbeec5d4343918fd0e48760e40539c
SHA1a049266c5c1131f692f306c8710d7e72586ae79d
SHA25648eb3ca078da2f5e9fd581197ae1b4dfbac6d86040addbb305e305c014741279
SHA5124e92450333d60b1977f75c240157a8589cfb1c80a979fbe0793cc641e13556004e554bc6f9f4853487dbcfcdc2ca93afe610649e9712e91415ed3f2a60d4fec0
-
memory/1556-161-0x0000000000010000-0x000000000001A000-memory.dmpFilesize
40KB
-
memory/1908-1266-0x0000000000400000-0x0000000000446000-memory.dmpFilesize
280KB
-
memory/1908-1267-0x00000000052D0000-0x00000000052E0000-memory.dmpFilesize
64KB
-
memory/1908-1268-0x00000000064F0000-0x000000000650E000-memory.dmpFilesize
120KB
-
memory/2044-1223-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1222-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1196-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1244-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1198-0x0000000008EB0000-0x0000000008EBA000-memory.dmpFilesize
40KB
-
memory/2044-1215-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1186-0x0000000006680000-0x000000000671C000-memory.dmpFilesize
624KB
-
memory/2044-1242-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2044-1174-0x0000000006850000-0x0000000006DBC000-memory.dmpFilesize
5.4MB
-
memory/2044-1173-0x0000000000A70000-0x0000000000BB0000-memory.dmpFilesize
1.2MB
-
memory/2044-1225-0x0000000006620000-0x0000000006630000-memory.dmpFilesize
64KB
-
memory/2184-1140-0x0000000004A10000-0x0000000004A20000-memory.dmpFilesize
64KB
-
memory/2184-1139-0x0000000000130000-0x0000000000162000-memory.dmpFilesize
200KB
-
memory/4180-1197-0x0000000003090000-0x00000000030A0000-memory.dmpFilesize
64KB
-
memory/4180-1195-0x0000000000E80000-0x0000000000F66000-memory.dmpFilesize
920KB
-
memory/4248-1224-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4248-1221-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4248-1220-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4624-1237-0x00000000006E0000-0x0000000000720000-memory.dmpFilesize
256KB
-
memory/4624-1238-0x000000001CB20000-0x000000001CB30000-memory.dmpFilesize
64KB
-
memory/4624-1241-0x000000001CB20000-0x000000001CB30000-memory.dmpFilesize
64KB
-
memory/4736-199-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-205-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/4736-167-0x0000000007270000-0x0000000007814000-memory.dmpFilesize
5.6MB
-
memory/4736-168-0x0000000002B80000-0x0000000002BAD000-memory.dmpFilesize
180KB
-
memory/4736-169-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4736-171-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4736-170-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4736-172-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-173-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-175-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-177-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-185-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-183-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-181-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-179-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-187-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-189-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-191-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-193-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-195-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-197-0x0000000004A80000-0x0000000004A92000-memory.dmpFilesize
72KB
-
memory/4736-200-0x0000000000400000-0x0000000002B7F000-memory.dmpFilesize
39.5MB
-
memory/4736-201-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4736-202-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/4736-203-0x0000000007260000-0x0000000007270000-memory.dmpFilesize
64KB
-
memory/5008-420-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-239-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-223-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-221-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-219-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-217-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-215-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-211-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-210-0x0000000002CB0000-0x0000000002CFB000-memory.dmpFilesize
300KB
-
memory/5008-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-229-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-231-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-233-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-235-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-237-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-241-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-243-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-245-0x0000000004CF0000-0x0000000004D2F000-memory.dmpFilesize
252KB
-
memory/5008-1125-0x00000000083C0000-0x0000000008452000-memory.dmpFilesize
584KB
-
memory/5008-1119-0x00000000078D0000-0x0000000007EE8000-memory.dmpFilesize
6.1MB
-
memory/5008-1120-0x0000000007F70000-0x000000000807A000-memory.dmpFilesize
1.0MB
-
memory/5008-1121-0x00000000080B0000-0x00000000080C2000-memory.dmpFilesize
72KB
-
memory/5008-1122-0x00000000080D0000-0x000000000810C000-memory.dmpFilesize
240KB
-
memory/5008-1123-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-1133-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-1132-0x0000000009080000-0x00000000095AC000-memory.dmpFilesize
5.2MB
-
memory/5008-1131-0x0000000008EB0000-0x0000000009072000-memory.dmpFilesize
1.8MB
-
memory/5008-1130-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-1129-0x0000000008CF0000-0x0000000008D40000-memory.dmpFilesize
320KB
-
memory/5008-1128-0x0000000008C60000-0x0000000008CD6000-memory.dmpFilesize
472KB
-
memory/5008-1127-0x0000000004A40000-0x0000000004A50000-memory.dmpFilesize
64KB
-
memory/5008-1126-0x0000000008460000-0x00000000084C6000-memory.dmpFilesize
408KB