Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 20:07
Static task
static1
General
-
Target
fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe
-
Size
1.0MB
-
MD5
6e14ef7dbebb817acf5800eb441d3590
-
SHA1
80ff40f5af808ccd57d6ede97dc09caf3c42bde7
-
SHA256
fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2
-
SHA512
5a62387a91bb44802b10303b2f48f37d331f2ded34d9114152b3bc63a6cf446221d2d063514f1a23b98cc3098254a956a0234488e2a688b4cfcb151d2ca296ed
-
SSDEEP
24576:ryi1Z+xROV/tPzI7iVqVYLjxwVeuq/djzADkxfNBw+Ywlpj:eibYROV1PkaBPKGzlxFBwfc
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Signatures
-
Processes:
az122895.execor5794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az122895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az122895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az122895.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor5794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor5794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor5794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor5794.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az122895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az122895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az122895.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor5794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor5794.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1824-235-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-236-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-238-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-240-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-242-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-244-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-246-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-248-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-250-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-252-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-254-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-256-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-258-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-260-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-262-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-264-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/1824-266-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bu451592.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation bu451592.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 11 IoCs
Processes:
kina6380.exekina0501.exekina6347.exeaz122895.exebu451592.exeoneetx.execor5794.exedRi13s24.exeoneetx.exeen835410.exeoneetx.exepid process 396 kina6380.exe 5060 kina0501.exe 4112 kina6347.exe 4332 az122895.exe 1776 bu451592.exe 1580 oneetx.exe 4676 cor5794.exe 1824 dRi13s24.exe 2104 oneetx.exe 3384 en835410.exe 3308 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 3372 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
cor5794.exeaz122895.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor5794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az122895.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor5794.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kina0501.exekina6347.exefbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exekina6380.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina0501.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6347.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina6347.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6380.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina6380.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina0501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3028 1776 WerFault.exe bu451592.exe 4684 1776 WerFault.exe bu451592.exe 4724 1776 WerFault.exe bu451592.exe 5032 1776 WerFault.exe bu451592.exe 1664 1776 WerFault.exe bu451592.exe 212 1776 WerFault.exe bu451592.exe 2808 1776 WerFault.exe bu451592.exe 4364 1776 WerFault.exe bu451592.exe 2408 1776 WerFault.exe bu451592.exe 3756 1776 WerFault.exe bu451592.exe 1384 1580 WerFault.exe oneetx.exe 2476 1580 WerFault.exe oneetx.exe 3692 1580 WerFault.exe oneetx.exe 4888 1580 WerFault.exe oneetx.exe 4500 1580 WerFault.exe oneetx.exe 5112 1580 WerFault.exe oneetx.exe 1444 1580 WerFault.exe oneetx.exe 2196 1580 WerFault.exe oneetx.exe 4084 1580 WerFault.exe oneetx.exe 2088 1580 WerFault.exe oneetx.exe 3996 1580 WerFault.exe oneetx.exe 4448 1580 WerFault.exe oneetx.exe 3796 4676 WerFault.exe cor5794.exe 4724 2104 WerFault.exe oneetx.exe 408 1824 WerFault.exe dRi13s24.exe 4200 1580 WerFault.exe oneetx.exe 1520 1580 WerFault.exe oneetx.exe 1064 1580 WerFault.exe oneetx.exe 4476 3308 WerFault.exe oneetx.exe 2720 1580 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
az122895.execor5794.exedRi13s24.exeen835410.exepid process 4332 az122895.exe 4332 az122895.exe 4676 cor5794.exe 4676 cor5794.exe 1824 dRi13s24.exe 1824 dRi13s24.exe 3384 en835410.exe 3384 en835410.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
az122895.execor5794.exedRi13s24.exeen835410.exedescription pid process Token: SeDebugPrivilege 4332 az122895.exe Token: SeDebugPrivilege 4676 cor5794.exe Token: SeDebugPrivilege 1824 dRi13s24.exe Token: SeDebugPrivilege 3384 en835410.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu451592.exepid process 1776 bu451592.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exekina6380.exekina0501.exekina6347.exebu451592.exeoneetx.exedescription pid process target process PID 456 wrote to memory of 396 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe kina6380.exe PID 456 wrote to memory of 396 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe kina6380.exe PID 456 wrote to memory of 396 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe kina6380.exe PID 396 wrote to memory of 5060 396 kina6380.exe kina0501.exe PID 396 wrote to memory of 5060 396 kina6380.exe kina0501.exe PID 396 wrote to memory of 5060 396 kina6380.exe kina0501.exe PID 5060 wrote to memory of 4112 5060 kina0501.exe kina6347.exe PID 5060 wrote to memory of 4112 5060 kina0501.exe kina6347.exe PID 5060 wrote to memory of 4112 5060 kina0501.exe kina6347.exe PID 4112 wrote to memory of 4332 4112 kina6347.exe az122895.exe PID 4112 wrote to memory of 4332 4112 kina6347.exe az122895.exe PID 4112 wrote to memory of 1776 4112 kina6347.exe bu451592.exe PID 4112 wrote to memory of 1776 4112 kina6347.exe bu451592.exe PID 4112 wrote to memory of 1776 4112 kina6347.exe bu451592.exe PID 1776 wrote to memory of 1580 1776 bu451592.exe oneetx.exe PID 1776 wrote to memory of 1580 1776 bu451592.exe oneetx.exe PID 1776 wrote to memory of 1580 1776 bu451592.exe oneetx.exe PID 5060 wrote to memory of 4676 5060 kina0501.exe cor5794.exe PID 5060 wrote to memory of 4676 5060 kina0501.exe cor5794.exe PID 5060 wrote to memory of 4676 5060 kina0501.exe cor5794.exe PID 1580 wrote to memory of 3840 1580 oneetx.exe schtasks.exe PID 1580 wrote to memory of 3840 1580 oneetx.exe schtasks.exe PID 1580 wrote to memory of 3840 1580 oneetx.exe schtasks.exe PID 396 wrote to memory of 1824 396 kina6380.exe dRi13s24.exe PID 396 wrote to memory of 1824 396 kina6380.exe dRi13s24.exe PID 396 wrote to memory of 1824 396 kina6380.exe dRi13s24.exe PID 456 wrote to memory of 3384 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe en835410.exe PID 456 wrote to memory of 3384 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe en835410.exe PID 456 wrote to memory of 3384 456 fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe en835410.exe PID 1580 wrote to memory of 3372 1580 oneetx.exe rundll32.exe PID 1580 wrote to memory of 3372 1580 oneetx.exe rundll32.exe PID 1580 wrote to memory of 3372 1580 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe"C:\Users\Admin\AppData\Local\Temp\fbb4df8dd00d81397d95514e6748d73e235e4f1a66bcc42a7d521b05663793c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6380.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0501.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6347.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6347.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az122895.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az122895.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu451592.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu451592.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 6966⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 7806⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 8566⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 9726⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 10006⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 9806⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 12126⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 12406⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 13206⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 6927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 8567⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 8967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10927⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 10007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 7727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 8727⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 7607⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 14327⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 11127⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 16287⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 14367⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 16447⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 13606⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5794.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5794.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 10805⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRi13s24.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRi13s24.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 16724⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en835410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en835410.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1776 -ip 17761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 636 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4676 -ip 46761⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2104 -s 3122⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2104 -ip 21041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 1824 -ip 18241⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 1580 -ip 15801⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 644 -p 1580 -ip 15801⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3308 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 652 -p 3308 -ip 33081⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 612 -p 1580 -ip 15801⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en835410.exeFilesize
168KB
MD5ee97e3ce66f14cf08b4d8145bcec2dff
SHA16674c165391a957eaba5ab112e8adfbab48620c0
SHA256fc136ef17fcda51c12f26e4b38f5159cb80afc499db9b446235f0381d3a73664
SHA512ef4fd981850c15ba30bef0a4fbbbb4dc357c1599b5d38d04ed08e8ab9e1c89a4175f4108b53a739a8eb1b340c1a87ab2a9f5eb24a195e4f9ccc25031334b7cae
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en835410.exeFilesize
168KB
MD5ee97e3ce66f14cf08b4d8145bcec2dff
SHA16674c165391a957eaba5ab112e8adfbab48620c0
SHA256fc136ef17fcda51c12f26e4b38f5159cb80afc499db9b446235f0381d3a73664
SHA512ef4fd981850c15ba30bef0a4fbbbb4dc357c1599b5d38d04ed08e8ab9e1c89a4175f4108b53a739a8eb1b340c1a87ab2a9f5eb24a195e4f9ccc25031334b7cae
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6380.exeFilesize
920KB
MD50a859a892ad6dff5f489b04ac336d59d
SHA1d36dbcd029f94032e59d1fb376cc0128dc51eb55
SHA25645dd504f45fdfca01bc762f5ab7a026fce004f2ae3eb1553b5fe4b71ed62eb19
SHA51282645bf5e6e0ff91130f9e8997985236e7394a21b759fb0f7c7f7ae5d9f864d2432e5e018a2b740b75d839724f0e1d2271183ef0f29af5d1ec545065f4df5df6
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina6380.exeFilesize
920KB
MD50a859a892ad6dff5f489b04ac336d59d
SHA1d36dbcd029f94032e59d1fb376cc0128dc51eb55
SHA25645dd504f45fdfca01bc762f5ab7a026fce004f2ae3eb1553b5fe4b71ed62eb19
SHA51282645bf5e6e0ff91130f9e8997985236e7394a21b759fb0f7c7f7ae5d9f864d2432e5e018a2b740b75d839724f0e1d2271183ef0f29af5d1ec545065f4df5df6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRi13s24.exeFilesize
297KB
MD58298969fe0650c79ee6d71e51daddda0
SHA1e19f9e71e50892fec86c16e7e92df16c29c7edaf
SHA2568d634b155346cf29336b1cc42de58e04ed611f3ef17d1c97226fa4a473214461
SHA512b73ed13c142a705aafb18d482be093010fcfff76b451dc3fd5970c3d8725324df6abb4d606b43023b40ec76a386daca526f21f22abd734989832974231a1d796
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dRi13s24.exeFilesize
297KB
MD58298969fe0650c79ee6d71e51daddda0
SHA1e19f9e71e50892fec86c16e7e92df16c29c7edaf
SHA2568d634b155346cf29336b1cc42de58e04ed611f3ef17d1c97226fa4a473214461
SHA512b73ed13c142a705aafb18d482be093010fcfff76b451dc3fd5970c3d8725324df6abb4d606b43023b40ec76a386daca526f21f22abd734989832974231a1d796
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0501.exeFilesize
589KB
MD55b8bcc476dc7e004853738049eb6cbe5
SHA11feaf0d952061b4cb6b0d0cb22b7a0444a824a62
SHA25663efcaf3820adf2d9af6c0756a220b7675530eca0f3582c8920e0c87a16fd2f1
SHA512e6b241fc6eb08eeb2c296660a13ca7b88bf4104c086b4493c85154b4ad0a0b95489ad38a47344df7db74367e976201d4e999c1cebdc225074d113a25fdaed98f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina0501.exeFilesize
589KB
MD55b8bcc476dc7e004853738049eb6cbe5
SHA11feaf0d952061b4cb6b0d0cb22b7a0444a824a62
SHA25663efcaf3820adf2d9af6c0756a220b7675530eca0f3582c8920e0c87a16fd2f1
SHA512e6b241fc6eb08eeb2c296660a13ca7b88bf4104c086b4493c85154b4ad0a0b95489ad38a47344df7db74367e976201d4e999c1cebdc225074d113a25fdaed98f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5794.exeFilesize
239KB
MD5505d5131d8a3aeb4e4d12eacff6e9744
SHA1c62f48874873cb8f2f6fa1a559b156f71ab1aa9d
SHA256b046f3cea866ef6818805d9f6f90d9ec3b075a6aac616ccf1c61484d60c0b10d
SHA512bc3f0360eeabd97271dbe2fb811d465d922decb36318f37354eb2921a8a7401738d89dbd003148ed101217d2bdb6c74f621a908aa9b1285dca410f0c24e32cac
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor5794.exeFilesize
239KB
MD5505d5131d8a3aeb4e4d12eacff6e9744
SHA1c62f48874873cb8f2f6fa1a559b156f71ab1aa9d
SHA256b046f3cea866ef6818805d9f6f90d9ec3b075a6aac616ccf1c61484d60c0b10d
SHA512bc3f0360eeabd97271dbe2fb811d465d922decb36318f37354eb2921a8a7401738d89dbd003148ed101217d2bdb6c74f621a908aa9b1285dca410f0c24e32cac
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6347.exeFilesize
316KB
MD5e2907ba28ec328e1554d83189e8ce54e
SHA1b653fcd53d532ce0fa01226dded26d4d6abce580
SHA256a086aa9180882602373906f39fdfc47d892d7e576f5f1885ce40f47864397eb3
SHA51231ead3b71398237aeafcd7b5d39b991a59c7d6841c32cbcef9da94b31b9cb7164dcb0885785c9e061bbe0ffc12e96a309879c555e472d3c88575e790a881652a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina6347.exeFilesize
316KB
MD5e2907ba28ec328e1554d83189e8ce54e
SHA1b653fcd53d532ce0fa01226dded26d4d6abce580
SHA256a086aa9180882602373906f39fdfc47d892d7e576f5f1885ce40f47864397eb3
SHA51231ead3b71398237aeafcd7b5d39b991a59c7d6841c32cbcef9da94b31b9cb7164dcb0885785c9e061bbe0ffc12e96a309879c555e472d3c88575e790a881652a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az122895.exeFilesize
11KB
MD5cd0e7d6b8708d7c23c17e609a57da634
SHA1c43bc62972567a23dda0d599f94da8efa25164ab
SHA25685d8d17fabf5106ad16eb2b8b141cd6166b696c8c92a979a5329321786acbf06
SHA5127d5ffcc60e4cd63a56645a3e9c02decbc94b1512a75430e6f24dc9892cf90d3c99a4493857d8c4b5990febf7d7c7fd3eb779794bb93058d806179300ff279cdc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az122895.exeFilesize
11KB
MD5cd0e7d6b8708d7c23c17e609a57da634
SHA1c43bc62972567a23dda0d599f94da8efa25164ab
SHA25685d8d17fabf5106ad16eb2b8b141cd6166b696c8c92a979a5329321786acbf06
SHA5127d5ffcc60e4cd63a56645a3e9c02decbc94b1512a75430e6f24dc9892cf90d3c99a4493857d8c4b5990febf7d7c7fd3eb779794bb93058d806179300ff279cdc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu451592.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu451592.exeFilesize
231KB
MD5f8117f396c10315824172b564d08490e
SHA196c20a6f156aa6e75f75fa9038a8878d75401138
SHA2567f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba
SHA51260606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/1580-220-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1776-182-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/1776-167-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/1824-1144-0x0000000005760000-0x000000000586A000-memory.dmpFilesize
1.0MB
-
memory/1824-1155-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-1160-0x0000000008000000-0x0000000008050000-memory.dmpFilesize
320KB
-
memory/1824-1159-0x0000000007F80000-0x0000000007FF6000-memory.dmpFilesize
472KB
-
memory/1824-1158-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-1157-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-1156-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-1153-0x0000000006540000-0x0000000006A6C000-memory.dmpFilesize
5.2MB
-
memory/1824-1152-0x0000000006370000-0x0000000006532000-memory.dmpFilesize
1.8MB
-
memory/1824-1151-0x0000000005C50000-0x0000000005CB6000-memory.dmpFilesize
408KB
-
memory/1824-1150-0x0000000005BB0000-0x0000000005C42000-memory.dmpFilesize
584KB
-
memory/1824-1147-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-1146-0x00000000058C0000-0x00000000058FC000-memory.dmpFilesize
240KB
-
memory/1824-1145-0x00000000058A0000-0x00000000058B2000-memory.dmpFilesize
72KB
-
memory/1824-1142-0x00000000050C0000-0x00000000056D8000-memory.dmpFilesize
6.1MB
-
memory/1824-266-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-264-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-262-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-231-0x00000000005B0000-0x00000000005FB000-memory.dmpFilesize
300KB
-
memory/1824-233-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-232-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-234-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/1824-235-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-236-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-238-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-240-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-242-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-244-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-246-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-248-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-250-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-252-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-254-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-256-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-258-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/1824-260-0x0000000005070000-0x00000000050AF000-memory.dmpFilesize
252KB
-
memory/3384-1167-0x0000000000C70000-0x0000000000CA0000-memory.dmpFilesize
192KB
-
memory/3384-1170-0x0000000005420000-0x0000000005430000-memory.dmpFilesize
64KB
-
memory/3384-1168-0x0000000005420000-0x0000000005430000-memory.dmpFilesize
64KB
-
memory/4332-161-0x0000000000120000-0x000000000012A000-memory.dmpFilesize
40KB
-
memory/4676-222-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-207-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-223-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-197-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-221-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4676-201-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-219-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-217-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-215-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-203-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-213-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-211-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-209-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-193-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-205-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-192-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-189-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-224-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-195-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB
-
memory/4676-226-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4676-191-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-190-0x0000000004B70000-0x0000000005114000-memory.dmpFilesize
5.6MB
-
memory/4676-188-0x0000000004B60000-0x0000000004B70000-memory.dmpFilesize
64KB
-
memory/4676-187-0x0000000000580000-0x00000000005AD000-memory.dmpFilesize
180KB
-
memory/4676-199-0x00000000025D0000-0x00000000025E2000-memory.dmpFilesize
72KB