Analysis
-
max time kernel
71s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 02:02
Static task
static1
General
-
Target
9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe
-
Size
1007KB
-
MD5
4ec605a0b7dfd9b49aa82442f6653393
-
SHA1
a90bf525d065cef1f525985cf6ab7228a42631a3
-
SHA256
9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4
-
SHA512
7f880f732a24b71cbbdc4f939bb2cdafc84c80028cc05304d3e236242aad159ce674850d829c6bb9279599b6c7c7aea29fe260a40cc92185a1e39f176eba91e4
-
SSDEEP
24576:Yyu31LtGXIHeQA3Eo86Tc+SEOVrOUwPoeZg6AFlL:fAVtJHefSwc+S1rObe6AF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
link
176.113.115.145:4125
-
auth_value
77e4c7bc6fea5ae755b29e8aea8f7012
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Extracted
aurora
141.98.6.253:8081
Extracted
redline
Anh123
199.115.193.116:11300
-
auth_value
db990971ec3911c24ea05eeccc2e1f60
Signatures
-
Processes:
tz5858.exev3648hO.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5858.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v3648hO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v3648hO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v3648hO.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz5858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v3648hO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v3648hO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5858.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v3648hO.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral1/memory/1032-211-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-210-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-213-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-215-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-217-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-219-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-221-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-223-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-225-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-227-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-229-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-231-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-233-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-235-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-237-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-239-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-241-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline behavioral1/memory/1032-243-0x0000000005380000-0x00000000053BF000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
y82jJ80.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation y82jJ80.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 12 IoCs
Processes:
zap0730.exezap3452.exezap0291.exetz5858.exev3648hO.exew34Pf78.exexJrmu92.exey82jJ80.exeoneetx.exeRhymers.exe0x5ddd.exeRhymers.exepid process 868 zap0730.exe 740 zap3452.exe 1664 zap0291.exe 1908 tz5858.exe 4028 v3648hO.exe 1032 w34Pf78.exe 2280 xJrmu92.exe 4524 y82jJ80.exe 1692 oneetx.exe 4912 Rhymers.exe 1392 0x5ddd.exe 4124 Rhymers.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz5858.exev3648hO.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5858.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v3648hO.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v3648hO.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap0291.exe9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exezap0730.exezap3452.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0291.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap0291.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap0730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap3452.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap3452.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Rhymers.exedescription pid process target process PID 4912 set thread context of 4124 4912 Rhymers.exe Rhymers.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4052 4028 WerFault.exe v3648hO.exe 2032 1032 WerFault.exe w34Pf78.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
tz5858.exev3648hO.exew34Pf78.exexJrmu92.exeRhymers.exepid process 1908 tz5858.exe 1908 tz5858.exe 4028 v3648hO.exe 4028 v3648hO.exe 1032 w34Pf78.exe 1032 w34Pf78.exe 2280 xJrmu92.exe 2280 xJrmu92.exe 4124 Rhymers.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
tz5858.exev3648hO.exew34Pf78.exexJrmu92.exeWMIC.exewmic.exedescription pid process Token: SeDebugPrivilege 1908 tz5858.exe Token: SeDebugPrivilege 4028 v3648hO.exe Token: SeDebugPrivilege 1032 w34Pf78.exe Token: SeDebugPrivilege 2280 xJrmu92.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe Token: 36 2736 WMIC.exe Token: SeIncreaseQuotaPrivilege 2736 WMIC.exe Token: SeSecurityPrivilege 2736 WMIC.exe Token: SeTakeOwnershipPrivilege 2736 WMIC.exe Token: SeLoadDriverPrivilege 2736 WMIC.exe Token: SeSystemProfilePrivilege 2736 WMIC.exe Token: SeSystemtimePrivilege 2736 WMIC.exe Token: SeProfSingleProcessPrivilege 2736 WMIC.exe Token: SeIncBasePriorityPrivilege 2736 WMIC.exe Token: SeCreatePagefilePrivilege 2736 WMIC.exe Token: SeBackupPrivilege 2736 WMIC.exe Token: SeRestorePrivilege 2736 WMIC.exe Token: SeShutdownPrivilege 2736 WMIC.exe Token: SeDebugPrivilege 2736 WMIC.exe Token: SeSystemEnvironmentPrivilege 2736 WMIC.exe Token: SeRemoteShutdownPrivilege 2736 WMIC.exe Token: SeUndockPrivilege 2736 WMIC.exe Token: SeManageVolumePrivilege 2736 WMIC.exe Token: 33 2736 WMIC.exe Token: 34 2736 WMIC.exe Token: 35 2736 WMIC.exe Token: 36 2736 WMIC.exe Token: SeIncreaseQuotaPrivilege 2108 wmic.exe Token: SeSecurityPrivilege 2108 wmic.exe Token: SeTakeOwnershipPrivilege 2108 wmic.exe Token: SeLoadDriverPrivilege 2108 wmic.exe Token: SeSystemProfilePrivilege 2108 wmic.exe Token: SeSystemtimePrivilege 2108 wmic.exe Token: SeProfSingleProcessPrivilege 2108 wmic.exe Token: SeIncBasePriorityPrivilege 2108 wmic.exe Token: SeCreatePagefilePrivilege 2108 wmic.exe Token: SeBackupPrivilege 2108 wmic.exe Token: SeRestorePrivilege 2108 wmic.exe Token: SeShutdownPrivilege 2108 wmic.exe Token: SeDebugPrivilege 2108 wmic.exe Token: SeSystemEnvironmentPrivilege 2108 wmic.exe Token: SeRemoteShutdownPrivilege 2108 wmic.exe Token: SeUndockPrivilege 2108 wmic.exe Token: SeManageVolumePrivilege 2108 wmic.exe Token: 33 2108 wmic.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
y82jJ80.exepid process 4524 y82jJ80.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exezap0730.exezap3452.exezap0291.exey82jJ80.exeoneetx.execmd.exeRhymers.exedescription pid process target process PID 2792 wrote to memory of 868 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe zap0730.exe PID 2792 wrote to memory of 868 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe zap0730.exe PID 2792 wrote to memory of 868 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe zap0730.exe PID 868 wrote to memory of 740 868 zap0730.exe zap3452.exe PID 868 wrote to memory of 740 868 zap0730.exe zap3452.exe PID 868 wrote to memory of 740 868 zap0730.exe zap3452.exe PID 740 wrote to memory of 1664 740 zap3452.exe zap0291.exe PID 740 wrote to memory of 1664 740 zap3452.exe zap0291.exe PID 740 wrote to memory of 1664 740 zap3452.exe zap0291.exe PID 1664 wrote to memory of 1908 1664 zap0291.exe tz5858.exe PID 1664 wrote to memory of 1908 1664 zap0291.exe tz5858.exe PID 1664 wrote to memory of 4028 1664 zap0291.exe v3648hO.exe PID 1664 wrote to memory of 4028 1664 zap0291.exe v3648hO.exe PID 1664 wrote to memory of 4028 1664 zap0291.exe v3648hO.exe PID 740 wrote to memory of 1032 740 zap3452.exe w34Pf78.exe PID 740 wrote to memory of 1032 740 zap3452.exe w34Pf78.exe PID 740 wrote to memory of 1032 740 zap3452.exe w34Pf78.exe PID 868 wrote to memory of 2280 868 zap0730.exe xJrmu92.exe PID 868 wrote to memory of 2280 868 zap0730.exe xJrmu92.exe PID 868 wrote to memory of 2280 868 zap0730.exe xJrmu92.exe PID 2792 wrote to memory of 4524 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe y82jJ80.exe PID 2792 wrote to memory of 4524 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe y82jJ80.exe PID 2792 wrote to memory of 4524 2792 9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe y82jJ80.exe PID 4524 wrote to memory of 1692 4524 y82jJ80.exe oneetx.exe PID 4524 wrote to memory of 1692 4524 y82jJ80.exe oneetx.exe PID 4524 wrote to memory of 1692 4524 y82jJ80.exe oneetx.exe PID 1692 wrote to memory of 2964 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 2964 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 2964 1692 oneetx.exe schtasks.exe PID 1692 wrote to memory of 3140 1692 oneetx.exe cmd.exe PID 1692 wrote to memory of 3140 1692 oneetx.exe cmd.exe PID 1692 wrote to memory of 3140 1692 oneetx.exe cmd.exe PID 3140 wrote to memory of 3496 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 3496 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 3496 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 3076 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 3076 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 3076 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 4944 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 4944 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 4944 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 1528 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 1528 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 1528 3140 cmd.exe cmd.exe PID 3140 wrote to memory of 3252 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 3252 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 3252 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 1268 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 1268 3140 cmd.exe cacls.exe PID 3140 wrote to memory of 1268 3140 cmd.exe cacls.exe PID 1692 wrote to memory of 4912 1692 oneetx.exe Rhymers.exe PID 1692 wrote to memory of 4912 1692 oneetx.exe Rhymers.exe PID 1692 wrote to memory of 4912 1692 oneetx.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 1692 wrote to memory of 1392 1692 oneetx.exe 0x5ddd.exe PID 1692 wrote to memory of 1392 1692 oneetx.exe 0x5ddd.exe PID 1692 wrote to memory of 1392 1692 oneetx.exe 0x5ddd.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe PID 4912 wrote to memory of 4124 4912 Rhymers.exe Rhymers.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe"C:\Users\Admin\AppData\Local\Temp\9eb392775b09258e2e4e14c513d6a703bb517221b0bbb1729f3630f769c57bd4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0730.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3452.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0291.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0291.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5858.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5858.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3648hO.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3648hO.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 10646⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34Pf78.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34Pf78.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 13365⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xJrmu92.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xJrmu92.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82jJ80.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82jJ80.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exe"C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exeC:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\1000043001\0x5ddd.exe"C:\Users\Admin\AppData\Local\Temp\1000043001\0x5ddd.exe"4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "wmic csproduct get uuid"5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid6⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic path win32_VideoController get name"5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic path win32_VideoController get name6⤵
-
C:\Windows\SysWOW64\cmd.execmd /C "wmic cpu get name"5⤵
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name6⤵
-
C:\Windows\SysWOW64\cmd.execmd "/c " systeminfo5⤵
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo6⤵
- Gathers system information
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4028 -ip 40281⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1032 -ip 10321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Rhymers.exe.logFilesize
1KB
MD5a3c82409506a33dec1856104ca55cbfd
SHA12e2ba4e4227590f8821002831c5410f7f45fe812
SHA256780a0d4410f5f9798cb573bcd774561d1439987a39b1368d3c890226928cd203
SHA5129621cfd3dab86d964a2bea6b3788fc19a895307962dcc41428741b8a86291f114df722e9017f755f63d53d09b5111e68f05aa505d9c9deae6c4378a87cdfa69f
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exeFilesize
897KB
MD52ac0ff27c872b8b784d31027f05d44cd
SHA1e8fa3f7dfd40bfc23935fc5ea4566c76b69f506b
SHA256854868444936c104865264145a8f00147741a523d666fe7e503324ca1adbb4d5
SHA51238436eec9116b77b62c9398d9440149f4d3ce0a5a9606874580390c159fca7b68db2866fdb20474caa86cef3ff1b0eae08b93fa36a2f03d9a37b9266df2d3ac0
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exeFilesize
897KB
MD52ac0ff27c872b8b784d31027f05d44cd
SHA1e8fa3f7dfd40bfc23935fc5ea4566c76b69f506b
SHA256854868444936c104865264145a8f00147741a523d666fe7e503324ca1adbb4d5
SHA51238436eec9116b77b62c9398d9440149f4d3ce0a5a9606874580390c159fca7b68db2866fdb20474caa86cef3ff1b0eae08b93fa36a2f03d9a37b9266df2d3ac0
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exeFilesize
897KB
MD52ac0ff27c872b8b784d31027f05d44cd
SHA1e8fa3f7dfd40bfc23935fc5ea4566c76b69f506b
SHA256854868444936c104865264145a8f00147741a523d666fe7e503324ca1adbb4d5
SHA51238436eec9116b77b62c9398d9440149f4d3ce0a5a9606874580390c159fca7b68db2866fdb20474caa86cef3ff1b0eae08b93fa36a2f03d9a37b9266df2d3ac0
-
C:\Users\Admin\AppData\Local\Temp\1000042001\Rhymers.exeFilesize
897KB
MD52ac0ff27c872b8b784d31027f05d44cd
SHA1e8fa3f7dfd40bfc23935fc5ea4566c76b69f506b
SHA256854868444936c104865264145a8f00147741a523d666fe7e503324ca1adbb4d5
SHA51238436eec9116b77b62c9398d9440149f4d3ce0a5a9606874580390c159fca7b68db2866fdb20474caa86cef3ff1b0eae08b93fa36a2f03d9a37b9266df2d3ac0
-
C:\Users\Admin\AppData\Local\Temp\1000043001\0x5ddd.exeFilesize
3.1MB
MD52b6319f8e8c87f1780f050151a422a1d
SHA14045039a1901a461d67614f99ec89e1121dee982
SHA256c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32
SHA512b18f8ac5d2139df50c9e310168269e40d201768147265985a487289c122499780a9d200833de2293c66d1e1eec0eb153ecc5d3d21f420977f79f7d0d827b96bc
-
C:\Users\Admin\AppData\Local\Temp\1000043001\0x5ddd.exeFilesize
3.1MB
MD52b6319f8e8c87f1780f050151a422a1d
SHA14045039a1901a461d67614f99ec89e1121dee982
SHA256c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32
SHA512b18f8ac5d2139df50c9e310168269e40d201768147265985a487289c122499780a9d200833de2293c66d1e1eec0eb153ecc5d3d21f420977f79f7d0d827b96bc
-
C:\Users\Admin\AppData\Local\Temp\1000043001\0x5ddd.exeFilesize
3.1MB
MD52b6319f8e8c87f1780f050151a422a1d
SHA14045039a1901a461d67614f99ec89e1121dee982
SHA256c08b7e5a6a4929a249386bce2af53bf522dd9a529f4f082088616c2d6041ce32
SHA512b18f8ac5d2139df50c9e310168269e40d201768147265985a487289c122499780a9d200833de2293c66d1e1eec0eb153ecc5d3d21f420977f79f7d0d827b96bc
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82jJ80.exeFilesize
236KB
MD5d1583d4332751addba48a254373c04e8
SHA1d5bd69990b4b3bc4501a7ec6ff1030e55db288ed
SHA256e866a9f663c016e35a26ca34294354a09ad9d91c18ec550261f9fa22e4a4cc7a
SHA51262b34930c4e30760a3e8907d66fe77e2ef91d3693352a1d010bbec2603ad6cafac02dfb1fa399ec699ade5e217da89b4a7dfc26e0afeed9e989ee8406dea4167
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y82jJ80.exeFilesize
236KB
MD5d1583d4332751addba48a254373c04e8
SHA1d5bd69990b4b3bc4501a7ec6ff1030e55db288ed
SHA256e866a9f663c016e35a26ca34294354a09ad9d91c18ec550261f9fa22e4a4cc7a
SHA51262b34930c4e30760a3e8907d66fe77e2ef91d3693352a1d010bbec2603ad6cafac02dfb1fa399ec699ade5e217da89b4a7dfc26e0afeed9e989ee8406dea4167
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0730.exeFilesize
823KB
MD5562c6e9fba577100e05d406c02ba24fa
SHA191e1802d63c4c22b1044e713d8b3a9970e765cf1
SHA256d6a9218f208e6e698cea96e3eb066b115b98911962018afb825899dadbd245ed
SHA5126996dd83aa1a7b11d9b2bda368ceca58629f727dcc2403ffd2efc12bed64ba1d637ca1b0e4644492750012a5919ef712bc1510899775a713bad35b307ce3849f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap0730.exeFilesize
823KB
MD5562c6e9fba577100e05d406c02ba24fa
SHA191e1802d63c4c22b1044e713d8b3a9970e765cf1
SHA256d6a9218f208e6e698cea96e3eb066b115b98911962018afb825899dadbd245ed
SHA5126996dd83aa1a7b11d9b2bda368ceca58629f727dcc2403ffd2efc12bed64ba1d637ca1b0e4644492750012a5919ef712bc1510899775a713bad35b307ce3849f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xJrmu92.exeFilesize
175KB
MD5c5e903d862cc9e64e8f5363978ba2e0f
SHA13f2219f0d77a53fbb6495e2c67553a0f31e093c0
SHA2565d00e2f7bdf38b220c7fadd6261f0bbbd10f8741dcc32f8cc404e47183a0259f
SHA512652494222dd88f6aa4ce3ffcd5de208cfbbbc37f45792d83fcb39d4ffeab49606892034f3cca2ed9db913c18a40a49ccba040cf29367ae88636b0ec3e4468245
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xJrmu92.exeFilesize
175KB
MD5c5e903d862cc9e64e8f5363978ba2e0f
SHA13f2219f0d77a53fbb6495e2c67553a0f31e093c0
SHA2565d00e2f7bdf38b220c7fadd6261f0bbbd10f8741dcc32f8cc404e47183a0259f
SHA512652494222dd88f6aa4ce3ffcd5de208cfbbbc37f45792d83fcb39d4ffeab49606892034f3cca2ed9db913c18a40a49ccba040cf29367ae88636b0ec3e4468245
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3452.exeFilesize
680KB
MD5f6d68392e6794dedd6448ff8abe2c5c0
SHA139bbe5502cea5baa60908074e717fcf303b5524e
SHA2568b8d075a59ce75fbace2ed4775c035bdfb362f50cf33835fdb5c284b4dafd499
SHA512e9c0616f710ef4063d15cfc39d85d2df48739e0cbd5158c8b051b70172ef6385732a6a33c193a959e9d053c9c1293b867b85abe6a623d905cb6341cf716e789b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3452.exeFilesize
680KB
MD5f6d68392e6794dedd6448ff8abe2c5c0
SHA139bbe5502cea5baa60908074e717fcf303b5524e
SHA2568b8d075a59ce75fbace2ed4775c035bdfb362f50cf33835fdb5c284b4dafd499
SHA512e9c0616f710ef4063d15cfc39d85d2df48739e0cbd5158c8b051b70172ef6385732a6a33c193a959e9d053c9c1293b867b85abe6a623d905cb6341cf716e789b
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34Pf78.exeFilesize
352KB
MD57e4f3f578d5a319f0ab22213a1280a94
SHA10ea4e3a0ea6cc47014670c43ca7eefbabdf545d2
SHA2562550358c11da866900923b24cf4d6a9b0ae8ed44e50b66da4f125c0208942a5a
SHA512d4f499ee9b9030c498da95fb014e75cbe8b85bfbec386fa1f300cdc2f9a47554bbe0737f69776af4fd6b0b535cd0d1b6aea0f89369011bfcb701313a41a45bd6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w34Pf78.exeFilesize
352KB
MD57e4f3f578d5a319f0ab22213a1280a94
SHA10ea4e3a0ea6cc47014670c43ca7eefbabdf545d2
SHA2562550358c11da866900923b24cf4d6a9b0ae8ed44e50b66da4f125c0208942a5a
SHA512d4f499ee9b9030c498da95fb014e75cbe8b85bfbec386fa1f300cdc2f9a47554bbe0737f69776af4fd6b0b535cd0d1b6aea0f89369011bfcb701313a41a45bd6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0291.exeFilesize
337KB
MD5f3a34c4a3056842206a6dc2c4bfa9484
SHA11f7e23dd6d34b0bad1570fe2750e17c4bf85adbb
SHA256ed85122828ce9203f7b25c0dd10e41927915b29b4a0a871e4911a8b2ed0e529d
SHA512adc4944478e86fe80c2e6327573bf0295c2110fdf5df31d9b857146ae503d93fe9ecb9fb140022db098ca298d7bdf869dcea8d7a23e44e0410f101e43ddacd73
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0291.exeFilesize
337KB
MD5f3a34c4a3056842206a6dc2c4bfa9484
SHA11f7e23dd6d34b0bad1570fe2750e17c4bf85adbb
SHA256ed85122828ce9203f7b25c0dd10e41927915b29b4a0a871e4911a8b2ed0e529d
SHA512adc4944478e86fe80c2e6327573bf0295c2110fdf5df31d9b857146ae503d93fe9ecb9fb140022db098ca298d7bdf869dcea8d7a23e44e0410f101e43ddacd73
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5858.exeFilesize
14KB
MD56989ab83a290fe6f7b385ea7e46e91d1
SHA143b585e7dab88cc9e46035ab994e424fb3b70687
SHA2564b529bbfb552887229a650475ce70c0acbc37ddc8337b76a45b3e00d0e5f9cf8
SHA512d4e5fa4014be238b0fa98f3ec18447cb0a6d282a5144abe3b4842a654c69dee6f536aeeac5ade5e2b06f0b27cc91464642401a38fd30e40986a3db327a8bf20c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz5858.exeFilesize
14KB
MD56989ab83a290fe6f7b385ea7e46e91d1
SHA143b585e7dab88cc9e46035ab994e424fb3b70687
SHA2564b529bbfb552887229a650475ce70c0acbc37ddc8337b76a45b3e00d0e5f9cf8
SHA512d4e5fa4014be238b0fa98f3ec18447cb0a6d282a5144abe3b4842a654c69dee6f536aeeac5ade5e2b06f0b27cc91464642401a38fd30e40986a3db327a8bf20c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3648hO.exeFilesize
294KB
MD56121be4f6ae5e9cf44cc3994b8259504
SHA1a757082acd8aebf9c203577fc76a7371068e0774
SHA256aa131225ef791f8c003abfbd7ff0b4af42c4e642b5c7b3d92763a3cfb9e60261
SHA512decbee23152b0e4492eb888cc3ab7e04892e1923baa6be2f135a5526a76dc1597f9a205a6e63d476497aaabdb1ff828d66f18f649720070e640eacbebbd7e49b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v3648hO.exeFilesize
294KB
MD56121be4f6ae5e9cf44cc3994b8259504
SHA1a757082acd8aebf9c203577fc76a7371068e0774
SHA256aa131225ef791f8c003abfbd7ff0b4af42c4e642b5c7b3d92763a3cfb9e60261
SHA512decbee23152b0e4492eb888cc3ab7e04892e1923baa6be2f135a5526a76dc1597f9a205a6e63d476497aaabdb1ff828d66f18f649720070e640eacbebbd7e49b
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5d1583d4332751addba48a254373c04e8
SHA1d5bd69990b4b3bc4501a7ec6ff1030e55db288ed
SHA256e866a9f663c016e35a26ca34294354a09ad9d91c18ec550261f9fa22e4a4cc7a
SHA51262b34930c4e30760a3e8907d66fe77e2ef91d3693352a1d010bbec2603ad6cafac02dfb1fa399ec699ade5e217da89b4a7dfc26e0afeed9e989ee8406dea4167
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5d1583d4332751addba48a254373c04e8
SHA1d5bd69990b4b3bc4501a7ec6ff1030e55db288ed
SHA256e866a9f663c016e35a26ca34294354a09ad9d91c18ec550261f9fa22e4a4cc7a
SHA51262b34930c4e30760a3e8907d66fe77e2ef91d3693352a1d010bbec2603ad6cafac02dfb1fa399ec699ade5e217da89b4a7dfc26e0afeed9e989ee8406dea4167
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5d1583d4332751addba48a254373c04e8
SHA1d5bd69990b4b3bc4501a7ec6ff1030e55db288ed
SHA256e866a9f663c016e35a26ca34294354a09ad9d91c18ec550261f9fa22e4a4cc7a
SHA51262b34930c4e30760a3e8907d66fe77e2ef91d3693352a1d010bbec2603ad6cafac02dfb1fa399ec699ade5e217da89b4a7dfc26e0afeed9e989ee8406dea4167
-
memory/1032-1133-0x00000000069A0000-0x00000000069F0000-memory.dmpFilesize
320KB
-
memory/1032-1122-0x0000000005D30000-0x0000000005D42000-memory.dmpFilesize
72KB
-
memory/1032-1135-0x0000000006D40000-0x000000000726C000-memory.dmpFilesize
5.2MB
-
memory/1032-1134-0x0000000006B70000-0x0000000006D32000-memory.dmpFilesize
1.8MB
-
memory/1032-1132-0x0000000006900000-0x0000000006976000-memory.dmpFilesize
472KB
-
memory/1032-1131-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1130-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1129-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1128-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1126-0x00000000060E0000-0x0000000006146000-memory.dmpFilesize
408KB
-
memory/1032-1125-0x0000000006040000-0x00000000060D2000-memory.dmpFilesize
584KB
-
memory/1032-211-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-210-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-213-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-215-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-217-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-219-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-221-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-223-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-225-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-227-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-229-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-231-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-233-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-235-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-237-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-239-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-241-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-243-0x0000000005380000-0x00000000053BF000-memory.dmpFilesize
252KB
-
memory/1032-321-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-319-0x00000000024A0000-0x00000000024EB000-memory.dmpFilesize
300KB
-
memory/1032-325-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-323-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1120-0x0000000005550000-0x0000000005B68000-memory.dmpFilesize
6.1MB
-
memory/1032-1121-0x0000000005BF0000-0x0000000005CFA000-memory.dmpFilesize
1.0MB
-
memory/1032-1124-0x0000000004DC0000-0x0000000004DD0000-memory.dmpFilesize
64KB
-
memory/1032-1123-0x0000000005D50000-0x0000000005D8C000-memory.dmpFilesize
240KB
-
memory/1908-161-0x0000000000010000-0x000000000001A000-memory.dmpFilesize
40KB
-
memory/2280-1141-0x0000000000C80000-0x0000000000CB2000-memory.dmpFilesize
200KB
-
memory/2280-1143-0x0000000002FC0000-0x0000000002FD0000-memory.dmpFilesize
64KB
-
memory/2280-1142-0x0000000002FC0000-0x0000000002FD0000-memory.dmpFilesize
64KB
-
memory/4028-185-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-179-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-201-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4028-200-0x0000000000400000-0x00000000007FE000-memory.dmpFilesize
4.0MB
-
memory/4028-191-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-199-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4028-198-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4028-189-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-187-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-204-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4028-205-0x0000000000400000-0x00000000007FE000-memory.dmpFilesize
4.0MB
-
memory/4028-195-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-197-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-183-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-181-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-203-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4028-177-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-175-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-173-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-193-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-171-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-167-0x0000000000880000-0x00000000008AD000-memory.dmpFilesize
180KB
-
memory/4028-170-0x00000000027C0000-0x00000000027D2000-memory.dmpFilesize
72KB
-
memory/4028-169-0x0000000004E80000-0x0000000005424000-memory.dmpFilesize
5.6MB
-
memory/4028-168-0x0000000004E70000-0x0000000004E80000-memory.dmpFilesize
64KB
-
memory/4124-1208-0x0000000000400000-0x0000000000432000-memory.dmpFilesize
200KB
-
memory/4124-1209-0x00000000058B0000-0x00000000058C0000-memory.dmpFilesize
64KB
-
memory/4912-1178-0x0000000004A50000-0x0000000004A60000-memory.dmpFilesize
64KB
-
memory/4912-1177-0x0000000000140000-0x0000000000226000-memory.dmpFilesize
920KB