Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
1.0MB
-
MD5
c9b5f258b70f02a2100aecd3e672c0c8
-
SHA1
16e2127780bc6c4e1f7b34146e3c5fa7dcd1f053
-
SHA256
b16787e5a61da0450fa7e41f94e35567fb46e5992eba62082f806648a4501650
-
SHA512
60a34ccdeac0477dfc82be7652f25583922922448faee781ec238c89714129eb6ed3097df7f51fcb67a329195c2bb27090788acfddb0126056161a6572960eae
-
SSDEEP
24576:fyoIeRCmx+AW0hSa4f9X+UdTbLE4PqfxcNlc:qIRCm4MEhfIETbL3CZcNl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
lamp
176.113.115.145:4125
-
auth_value
8a3e8bc22f2496c7c5339eb332073902
Extracted
amadey
3.69
193.233.20.36/joomla/index.php
Signatures
-
Processes:
tz0782.exev1623Sv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz0782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz0782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz0782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v1623Sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v1623Sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v1623Sv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz0782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz0782.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz0782.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v1623Sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v1623Sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v1623Sv.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
Processes:
resource yara_rule behavioral2/memory/556-207-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-208-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-210-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-212-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-214-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-216-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-218-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-221-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-228-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-224-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-230-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-234-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-236-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-232-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-238-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-240-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-242-0x0000000002850000-0x000000000288F000-memory.dmp family_redline behavioral2/memory/556-244-0x0000000002850000-0x000000000288F000-memory.dmp family_redline -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
y30Xn32.exeoneetx.exeDCRatBuild127.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation y30Xn32.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation DCRatBuild127.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 13 IoCs
Processes:
zap2137.exezap2342.exezap0316.exetz0782.exev1623Sv.exew40jz49.exexKZBD23.exey30Xn32.exeoneetx.exeoneetx.exeDCRatBuild127.exeTraderBro770.exeoneetx.exepid process 4104 zap2137.exe 4848 zap2342.exe 2836 zap0316.exe 728 tz0782.exe 4260 v1623Sv.exe 556 w40jz49.exe 2924 xKZBD23.exe 1344 y30Xn32.exe 740 oneetx.exe 4068 oneetx.exe 3680 DCRatBuild127.exe 4456 TraderBro770.exe 2396 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
tz0782.exev1623Sv.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz0782.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v1623Sv.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v1623Sv.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
zap2137.exezap2342.exezap0316.exetmp.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2137.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap2137.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap2342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap2342.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zap0316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap0316.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmp.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
TraderBro770.exedescription pid process target process PID 4456 set thread context of 2400 4456 TraderBro770.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3084 4260 WerFault.exe v1623Sv.exe 4820 556 WerFault.exe w40jz49.exe 1208 4456 WerFault.exe TraderBro770.exe 4620 2400 WerFault.exe AppLaunch.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 1 IoCs
Processes:
DCRatBuild127.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000_Classes\Local Settings DCRatBuild127.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
tz0782.exev1623Sv.exew40jz49.exexKZBD23.exepid process 728 tz0782.exe 728 tz0782.exe 4260 v1623Sv.exe 4260 v1623Sv.exe 556 w40jz49.exe 556 w40jz49.exe 2924 xKZBD23.exe 2924 xKZBD23.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
tz0782.exev1623Sv.exew40jz49.exexKZBD23.exedescription pid process Token: SeDebugPrivilege 728 tz0782.exe Token: SeDebugPrivilege 4260 v1623Sv.exe Token: SeDebugPrivilege 556 w40jz49.exe Token: SeDebugPrivilege 2924 xKZBD23.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
y30Xn32.exepid process 1344 y30Xn32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
tmp.exezap2137.exezap2342.exezap0316.exey30Xn32.exeoneetx.execmd.exeDCRatBuild127.exeTraderBro770.exedescription pid process target process PID 3348 wrote to memory of 4104 3348 tmp.exe zap2137.exe PID 3348 wrote to memory of 4104 3348 tmp.exe zap2137.exe PID 3348 wrote to memory of 4104 3348 tmp.exe zap2137.exe PID 4104 wrote to memory of 4848 4104 zap2137.exe zap2342.exe PID 4104 wrote to memory of 4848 4104 zap2137.exe zap2342.exe PID 4104 wrote to memory of 4848 4104 zap2137.exe zap2342.exe PID 4848 wrote to memory of 2836 4848 zap2342.exe zap0316.exe PID 4848 wrote to memory of 2836 4848 zap2342.exe zap0316.exe PID 4848 wrote to memory of 2836 4848 zap2342.exe zap0316.exe PID 2836 wrote to memory of 728 2836 zap0316.exe tz0782.exe PID 2836 wrote to memory of 728 2836 zap0316.exe tz0782.exe PID 2836 wrote to memory of 4260 2836 zap0316.exe v1623Sv.exe PID 2836 wrote to memory of 4260 2836 zap0316.exe v1623Sv.exe PID 2836 wrote to memory of 4260 2836 zap0316.exe v1623Sv.exe PID 4848 wrote to memory of 556 4848 zap2342.exe w40jz49.exe PID 4848 wrote to memory of 556 4848 zap2342.exe w40jz49.exe PID 4848 wrote to memory of 556 4848 zap2342.exe w40jz49.exe PID 4104 wrote to memory of 2924 4104 zap2137.exe xKZBD23.exe PID 4104 wrote to memory of 2924 4104 zap2137.exe xKZBD23.exe PID 4104 wrote to memory of 2924 4104 zap2137.exe xKZBD23.exe PID 3348 wrote to memory of 1344 3348 tmp.exe y30Xn32.exe PID 3348 wrote to memory of 1344 3348 tmp.exe y30Xn32.exe PID 3348 wrote to memory of 1344 3348 tmp.exe y30Xn32.exe PID 1344 wrote to memory of 740 1344 y30Xn32.exe oneetx.exe PID 1344 wrote to memory of 740 1344 y30Xn32.exe oneetx.exe PID 1344 wrote to memory of 740 1344 y30Xn32.exe oneetx.exe PID 740 wrote to memory of 3668 740 oneetx.exe schtasks.exe PID 740 wrote to memory of 3668 740 oneetx.exe schtasks.exe PID 740 wrote to memory of 3668 740 oneetx.exe schtasks.exe PID 740 wrote to memory of 1272 740 oneetx.exe cmd.exe PID 740 wrote to memory of 1272 740 oneetx.exe cmd.exe PID 740 wrote to memory of 1272 740 oneetx.exe cmd.exe PID 1272 wrote to memory of 1800 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 1800 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 1800 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 1240 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 1240 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 1240 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 2216 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 2216 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 2216 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 2892 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 2892 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 2892 1272 cmd.exe cmd.exe PID 1272 wrote to memory of 996 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 996 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 996 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 4604 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 4604 1272 cmd.exe cacls.exe PID 1272 wrote to memory of 4604 1272 cmd.exe cacls.exe PID 740 wrote to memory of 3680 740 oneetx.exe DCRatBuild127.exe PID 740 wrote to memory of 3680 740 oneetx.exe DCRatBuild127.exe PID 740 wrote to memory of 3680 740 oneetx.exe DCRatBuild127.exe PID 3680 wrote to memory of 3528 3680 DCRatBuild127.exe WScript.exe PID 3680 wrote to memory of 3528 3680 DCRatBuild127.exe WScript.exe PID 3680 wrote to memory of 3528 3680 DCRatBuild127.exe WScript.exe PID 740 wrote to memory of 4456 740 oneetx.exe TraderBro770.exe PID 740 wrote to memory of 4456 740 oneetx.exe TraderBro770.exe PID 740 wrote to memory of 4456 740 oneetx.exe TraderBro770.exe PID 4456 wrote to memory of 2400 4456 TraderBro770.exe AppLaunch.exe PID 4456 wrote to memory of 2400 4456 TraderBro770.exe AppLaunch.exe PID 4456 wrote to memory of 2400 4456 TraderBro770.exe AppLaunch.exe PID 4456 wrote to memory of 2400 4456 TraderBro770.exe AppLaunch.exe PID 4456 wrote to memory of 2400 4456 TraderBro770.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2137.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2137.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2342.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0316.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0316.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0782.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0782.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1623Sv.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1623Sv.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 10846⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w40jz49.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w40jz49.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 11445⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKZBD23.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKZBD23.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y30Xn32.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y30Xn32.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe" /F4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c5d2db5804" /P "Admin:N"&&CACLS "..\c5d2db5804" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:N"5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c5d2db5804" /P "Admin:R" /E5⤵
-
C:\Users\Admin\AppData\Local\Temp\1000048001\DCRatBuild127.exe"C:\Users\Admin\AppData\Local\Temp\1000048001\DCRatBuild127.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\wincrtDll\Kiq5HCXulld4.vbe"5⤵
- Checks computer location settings
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\wincrtDll\3K4aPY2c2MDUmgYCS2.bat" "6⤵
-
C:\Users\Admin\AppData\Local\Temp\1000049001\TraderBro770.exe"C:\Users\Admin\AppData\Local\Temp\1000049001\TraderBro770.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 6086⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 1405⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4260 -ip 42601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 556 -ip 5561⤵
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4456 -ip 44561⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2400 -ip 24001⤵
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1000048001\DCRatBuild127.exeFilesize
309KB
MD5757123039fc621efee71d41b044d14c5
SHA1d3b5b88f7d5aeddf4994a90b5d888677c31d72b9
SHA256afcaa62dd1e4dddd03a67db6175f406742c7c759b2f919e20a142d8b89554064
SHA5125d910968da586bce3b3ba35727492abcc928abe016265aa17b366b1e4f4c5c1f814f44612595abdfdae2e9a87524e4085aa0151adcdee72f95fc41642beaf4b1
-
C:\Users\Admin\AppData\Local\Temp\1000048001\DCRatBuild127.exeFilesize
309KB
MD5757123039fc621efee71d41b044d14c5
SHA1d3b5b88f7d5aeddf4994a90b5d888677c31d72b9
SHA256afcaa62dd1e4dddd03a67db6175f406742c7c759b2f919e20a142d8b89554064
SHA5125d910968da586bce3b3ba35727492abcc928abe016265aa17b366b1e4f4c5c1f814f44612595abdfdae2e9a87524e4085aa0151adcdee72f95fc41642beaf4b1
-
C:\Users\Admin\AppData\Local\Temp\1000048001\DCRatBuild127.exeFilesize
309KB
MD5757123039fc621efee71d41b044d14c5
SHA1d3b5b88f7d5aeddf4994a90b5d888677c31d72b9
SHA256afcaa62dd1e4dddd03a67db6175f406742c7c759b2f919e20a142d8b89554064
SHA5125d910968da586bce3b3ba35727492abcc928abe016265aa17b366b1e4f4c5c1f814f44612595abdfdae2e9a87524e4085aa0151adcdee72f95fc41642beaf4b1
-
C:\Users\Admin\AppData\Local\Temp\1000049001\TraderBro770.exeFilesize
1.4MB
MD5dac3cc50390b225c5d309a87b7e91b59
SHA1d5905b6451ae394f39676d9ea90f05f062e733da
SHA256ded08097483f68502d8dbe467d9f9f4f8b976cdffea71f8b4695c777341de2a2
SHA5123b5fab0fa70f0c7b514ccb7f3a6632d6983a9c772043502dac450e29f8896ba1b5337331037480e7c9b940ca10f6080806a97082674ed725d56fab451558c682
-
C:\Users\Admin\AppData\Local\Temp\1000049001\TraderBro770.exeFilesize
1.4MB
MD5dac3cc50390b225c5d309a87b7e91b59
SHA1d5905b6451ae394f39676d9ea90f05f062e733da
SHA256ded08097483f68502d8dbe467d9f9f4f8b976cdffea71f8b4695c777341de2a2
SHA5123b5fab0fa70f0c7b514ccb7f3a6632d6983a9c772043502dac450e29f8896ba1b5337331037480e7c9b940ca10f6080806a97082674ed725d56fab451558c682
-
C:\Users\Admin\AppData\Local\Temp\1000049001\TraderBro770.exeFilesize
1.4MB
MD5dac3cc50390b225c5d309a87b7e91b59
SHA1d5905b6451ae394f39676d9ea90f05f062e733da
SHA256ded08097483f68502d8dbe467d9f9f4f8b976cdffea71f8b4695c777341de2a2
SHA5123b5fab0fa70f0c7b514ccb7f3a6632d6983a9c772043502dac450e29f8896ba1b5337331037480e7c9b940ca10f6080806a97082674ed725d56fab451558c682
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y30Xn32.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y30Xn32.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2137.exeFilesize
857KB
MD5abd0886b53d2f44518fe21c8c9cf6f05
SHA1bf7ca55b25682e97bbf63e3b4c8c28198ca11292
SHA256f299fca281037e770552521cfa00f0edbeb0e972e467b8338aa2dcd006286185
SHA51237f60df708815b2fef46d3619694a322e62167ada3855f8ba533c6bb8ce758012fb22f776f8da61dd4d6ad01323deb2313a7ba6e7502822fa74fe7740647e1a3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap2137.exeFilesize
857KB
MD5abd0886b53d2f44518fe21c8c9cf6f05
SHA1bf7ca55b25682e97bbf63e3b4c8c28198ca11292
SHA256f299fca281037e770552521cfa00f0edbeb0e972e467b8338aa2dcd006286185
SHA51237f60df708815b2fef46d3619694a322e62167ada3855f8ba533c6bb8ce758012fb22f776f8da61dd4d6ad01323deb2313a7ba6e7502822fa74fe7740647e1a3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKZBD23.exeFilesize
168KB
MD5666bb60c328d0ee81a4b2ba294350026
SHA1786ccf2457a34b1ec8fe0de37d17c3258eddf44f
SHA2568db7dd93644ac289ca8858fd269937f56742501ba0819ace3b8cc4d6168a5f85
SHA51285f8689d69d6a0b56cbdb33bb343ad4fbbd42369745c1ce25d68fd46eb53931ed381b999b5e12f3cf9783da2bb88170083b906c59c629f06da53b8208dde08f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xKZBD23.exeFilesize
168KB
MD5666bb60c328d0ee81a4b2ba294350026
SHA1786ccf2457a34b1ec8fe0de37d17c3258eddf44f
SHA2568db7dd93644ac289ca8858fd269937f56742501ba0819ace3b8cc4d6168a5f85
SHA51285f8689d69d6a0b56cbdb33bb343ad4fbbd42369745c1ce25d68fd46eb53931ed381b999b5e12f3cf9783da2bb88170083b906c59c629f06da53b8208dde08f1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2342.exeFilesize
703KB
MD552d269a8dfd7f9cee7461b993d890161
SHA1010190e03096a98fddac24b4581dbd0b725f6f1f
SHA256b8d975f44c8b8566aeb2a085b70ada7b2be75629770289d943b153be0ae90cb0
SHA5129e148fbf918b804b5d98c670e751b494a46778e07be9c6e9db4580072173e707eeb39e9beea675f97498514483706912056290ed8ba763349ae90fd5c1752a6a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2342.exeFilesize
703KB
MD552d269a8dfd7f9cee7461b993d890161
SHA1010190e03096a98fddac24b4581dbd0b725f6f1f
SHA256b8d975f44c8b8566aeb2a085b70ada7b2be75629770289d943b153be0ae90cb0
SHA5129e148fbf918b804b5d98c670e751b494a46778e07be9c6e9db4580072173e707eeb39e9beea675f97498514483706912056290ed8ba763349ae90fd5c1752a6a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w40jz49.exeFilesize
372KB
MD5389bf561b55ff4e1b6603bbad407de38
SHA108c37a8b902712cdaf51e4ce7513d1af5572959e
SHA256179e4285c06ce2357b62f0f0bae51d2fd2afcc2e183e7fa2e0fc0a56e73c2771
SHA512f079b5d202d33646323bab23f05d7b85b6db124ffb23ebf0f19205ea7df25ec2cc9256979d7e3d1d6c0773912f12f9208e5b5691804c0b55dba6fec2a13a8fcb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w40jz49.exeFilesize
372KB
MD5389bf561b55ff4e1b6603bbad407de38
SHA108c37a8b902712cdaf51e4ce7513d1af5572959e
SHA256179e4285c06ce2357b62f0f0bae51d2fd2afcc2e183e7fa2e0fc0a56e73c2771
SHA512f079b5d202d33646323bab23f05d7b85b6db124ffb23ebf0f19205ea7df25ec2cc9256979d7e3d1d6c0773912f12f9208e5b5691804c0b55dba6fec2a13a8fcb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0316.exeFilesize
347KB
MD5b4e279bd25de3bfc53ce28d39c2588ae
SHA1dec89cd746c22736941a9229dfb11df864aab913
SHA256c18f435094d1596fd9caf13d2c0a0e995eca46e22452cc7a83152c50dc2392d6
SHA51297535b557cad359a19fad97bbd6496c4dcde48b74501b59e8d44cf6aacf2cb10cbb7785a271f2237057b058efb42d9b33e091310d25c474b05e084df02564e1f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap0316.exeFilesize
347KB
MD5b4e279bd25de3bfc53ce28d39c2588ae
SHA1dec89cd746c22736941a9229dfb11df864aab913
SHA256c18f435094d1596fd9caf13d2c0a0e995eca46e22452cc7a83152c50dc2392d6
SHA51297535b557cad359a19fad97bbd6496c4dcde48b74501b59e8d44cf6aacf2cb10cbb7785a271f2237057b058efb42d9b33e091310d25c474b05e084df02564e1f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0782.exeFilesize
12KB
MD5fa96e847178070c9394964356d916f3d
SHA12437a2e27c981e2a8821f5b91668387bc2152a24
SHA256ad46b6158d4261eb391aece57355e70905ceff6fa1291a33d7ac287568680807
SHA5120bb814d3b73934ca3c52e0349923d96fddd8c7ba3e2cbf2ee0bc9ca2feb5acccf18db4d5937495bad5047bd3906f4c769796a79c4bcb0645db04d236355e074a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz0782.exeFilesize
12KB
MD5fa96e847178070c9394964356d916f3d
SHA12437a2e27c981e2a8821f5b91668387bc2152a24
SHA256ad46b6158d4261eb391aece57355e70905ceff6fa1291a33d7ac287568680807
SHA5120bb814d3b73934ca3c52e0349923d96fddd8c7ba3e2cbf2ee0bc9ca2feb5acccf18db4d5937495bad5047bd3906f4c769796a79c4bcb0645db04d236355e074a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1623Sv.exeFilesize
314KB
MD50988842e715fda912cc912578ad573b0
SHA1813180da21d5547fa3ad5a2d2092d0f26f66c839
SHA2565995cc33e6c0d1e998d2b8107b749d12a42bcfa13cfaeedea2c2c09948fdc2f9
SHA51280d24fe15bdd5a116360ccbde63089597ca516feddfa9654713b97742ee3b581ae1a064f688828ab8c1dd394c2642eba8fcda76097a94ab73fc2c0eeb0b7ff8b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1623Sv.exeFilesize
314KB
MD50988842e715fda912cc912578ad573b0
SHA1813180da21d5547fa3ad5a2d2092d0f26f66c839
SHA2565995cc33e6c0d1e998d2b8107b749d12a42bcfa13cfaeedea2c2c09948fdc2f9
SHA51280d24fe15bdd5a116360ccbde63089597ca516feddfa9654713b97742ee3b581ae1a064f688828ab8c1dd394c2642eba8fcda76097a94ab73fc2c0eeb0b7ff8b
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Local\Temp\c5d2db5804\oneetx.exeFilesize
236KB
MD5479d0e993ae6b49c487653f7e43c4d3f
SHA12166ec131be52a5f72b267422307956486e7c23d
SHA256f7fa98b74f3cbb225a4ae2e7507914e8906c388adf3d1d887e8d1ed628184827
SHA51210f6a48bc751227ee887d0d3d8089202f540c7613468b2849fad5ba61fef99e0569bf1c8a5eca21dee82a5e441354fa792fee68b7fb2e4dbc91a6d0c09cb3228
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD56a4c2f2b6e1bbce94b4d00e91e690d0d
SHA1f61021fd82dabd2ccde8d1e46736b1a9f4e4ce57
SHA2568b6af7cc4fc3bcb4172a2bf4a7727175ba48980bcc808e56ce7744d28af60a8f
SHA5128c9154748e410b71942c5316b1bdcc5590f7f0da33c0139fb4c86087a78b8c16ab76f1fa724524169e0f3d1a3d1f138dfd60979ee3e4b6487a66532879371f01
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
C:\wincrtDll\3K4aPY2c2MDUmgYCS2.batFilesize
28B
MD5816ed385c1604f9b08773ea1397c9080
SHA1c8c1da0c4c8f266d6cb38f06b20de6f3c89c52de
SHA2560df4177eb40b163a3ede52cc20f59921a2a35bca6b4eb4194bcf5a6c6d38a94c
SHA512ebef216d7f43fa36c839cd19475e7cfaf453be9c2ab5e4ecc2ed2f56e1d63469ef1556e39bf0b756f7c5e757139e8b0e50ea5bd362a3477b0e9375832a31ce8e
-
C:\wincrtDll\Kiq5HCXulld4.vbeFilesize
204B
MD59db591218ed1a50771c7dc7f0e8511e8
SHA111892f9ece85f7f10efcc561945f4379b0061943
SHA256a99b8c2e6a91764f630ae6783c02119dd1631864a24e6751a068488b19a59116
SHA5120eebd9fe2b9a305511f430a500f5e568b5073b6fc0924f0a75e3a2d1601ed2b6b2d5cb32f56e6b006280507940b876dca4c78827afb81396b6e6c5f15d7880e1
-
memory/556-1130-0x0000000006B30000-0x0000000006CF2000-memory.dmpFilesize
1.8MB
-
memory/556-1125-0x00000000067F0000-0x0000000006866000-memory.dmpFilesize
472KB
-
memory/556-207-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-208-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-210-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-212-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-214-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-216-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-218-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-220-0x0000000000870000-0x00000000008BB000-memory.dmpFilesize
300KB
-
memory/556-221-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-223-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-225-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-227-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-228-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-224-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-230-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-234-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-236-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-232-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-238-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-240-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-242-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-244-0x0000000002850000-0x000000000288F000-memory.dmpFilesize
252KB
-
memory/556-1117-0x0000000005630000-0x0000000005C48000-memory.dmpFilesize
6.1MB
-
memory/556-1118-0x0000000005C50000-0x0000000005D5A000-memory.dmpFilesize
1.0MB
-
memory/556-1119-0x0000000002AF0000-0x0000000002B02000-memory.dmpFilesize
72KB
-
memory/556-1120-0x0000000005D60000-0x0000000005D9C000-memory.dmpFilesize
240KB
-
memory/556-1121-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-1123-0x0000000006050000-0x00000000060B6000-memory.dmpFilesize
408KB
-
memory/556-1124-0x0000000006710000-0x00000000067A2000-memory.dmpFilesize
584KB
-
memory/556-1132-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-1126-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-1128-0x0000000006880000-0x00000000068D0000-memory.dmpFilesize
320KB
-
memory/556-1129-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-1127-0x0000000005070000-0x0000000005080000-memory.dmpFilesize
64KB
-
memory/556-1131-0x0000000006D50000-0x000000000727C000-memory.dmpFilesize
5.2MB
-
memory/728-161-0x00000000001B0000-0x00000000001BA000-memory.dmpFilesize
40KB
-
memory/2924-1138-0x0000000000A60000-0x0000000000A90000-memory.dmpFilesize
192KB
-
memory/2924-1139-0x0000000005300000-0x0000000005310000-memory.dmpFilesize
64KB
-
memory/4260-184-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-178-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-199-0x0000000000400000-0x0000000000802000-memory.dmpFilesize
4.0MB
-
memory/4260-196-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-190-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-192-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-194-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-188-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-186-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-200-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/4260-182-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-198-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-180-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-176-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-174-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-172-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-171-0x0000000004EB0000-0x0000000004EC2000-memory.dmpFilesize
72KB
-
memory/4260-170-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/4260-169-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/4260-168-0x0000000000810000-0x000000000083D000-memory.dmpFilesize
180KB
-
memory/4260-167-0x0000000004F10000-0x00000000054B4000-memory.dmpFilesize
5.6MB
-
memory/4260-202-0x0000000000400000-0x0000000000802000-memory.dmpFilesize
4.0MB