Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-04-2023 21:14
Static task
static1
General
-
Target
1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe
-
Size
1.0MB
-
MD5
09d208e79e86aca49a8d1573fb9dde8b
-
SHA1
2120e49ed78f27c87c8096374cf02777ec226972
-
SHA256
1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a
-
SHA512
87c5f3c3ccdaef85b8df1492989e828427664fca291573f61b49251bfb0da6c101d97c65be0f6ba6613866d5856be82f34696f30ae99b579b0a7ada72c120361
-
SSDEEP
24576:myFGplOgGiQ6mdtI/pzU463FuSET3RBD3yhcxf9MP68+duMLs8:1ghQNfI/pzUlFuSEdBdxOpEu
Malware Config
Extracted
amadey
3.70
77.91.124.207/plays/chapter/index.php
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Extracted
redline
brat
176.113.115.145:4125
-
auth_value
1f9c658aed2f70f42f99a57a005561cf
Signatures
-
Processes:
cor4119.exeaz368745.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor4119.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection az368745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" az368745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" az368745.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor4119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor4119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor4119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor4119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" az368745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" az368745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" az368745.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor4119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/1340-234-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-235-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-237-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-239-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-241-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-247-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-251-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-253-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-243-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-255-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-257-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-259-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-261-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-263-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-265-0x0000000002360000-0x000000000239F000-memory.dmp family_redline behavioral1/memory/1340-267-0x0000000002360000-0x000000000239F000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bu817472.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation bu817472.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 11 IoCs
Processes:
kina8176.exekina6447.exekina3405.exeaz368745.exebu817472.exeoneetx.execor4119.exeoneetx.exedSi86s60.exeen361019.exeoneetx.exepid process 1480 kina8176.exe 632 kina6447.exe 1324 kina3405.exe 2056 az368745.exe 4376 bu817472.exe 2660 oneetx.exe 4484 cor4119.exe 1484 oneetx.exe 1340 dSi86s60.exe 508 en361019.exe 3916 oneetx.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1096 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
az368745.execor4119.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" az368745.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor4119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor4119.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
kina6447.exekina3405.exe1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exekina8176.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina6447.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina3405.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina3405.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina8176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina8176.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce kina6447.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 30 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1128 4376 WerFault.exe bu817472.exe 4424 4376 WerFault.exe bu817472.exe 3476 4376 WerFault.exe bu817472.exe 1096 4376 WerFault.exe bu817472.exe 3352 4376 WerFault.exe bu817472.exe 3960 4376 WerFault.exe bu817472.exe 3468 4376 WerFault.exe bu817472.exe 3776 4376 WerFault.exe bu817472.exe 3984 4376 WerFault.exe bu817472.exe 4048 4376 WerFault.exe bu817472.exe 3368 2660 WerFault.exe oneetx.exe 1868 2660 WerFault.exe oneetx.exe 1760 2660 WerFault.exe oneetx.exe 4984 2660 WerFault.exe oneetx.exe 1536 2660 WerFault.exe oneetx.exe 1400 2660 WerFault.exe oneetx.exe 5060 2660 WerFault.exe oneetx.exe 1928 2660 WerFault.exe oneetx.exe 3528 2660 WerFault.exe oneetx.exe 3124 2660 WerFault.exe oneetx.exe 2232 2660 WerFault.exe oneetx.exe 4604 2660 WerFault.exe oneetx.exe 3940 4484 WerFault.exe cor4119.exe 4616 1484 WerFault.exe oneetx.exe 4768 1340 WerFault.exe dSi86s60.exe 4840 2660 WerFault.exe oneetx.exe 2168 2660 WerFault.exe oneetx.exe 116 2660 WerFault.exe oneetx.exe 4512 3916 WerFault.exe oneetx.exe 2100 2660 WerFault.exe oneetx.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
az368745.execor4119.exedSi86s60.exeen361019.exepid process 2056 az368745.exe 2056 az368745.exe 4484 cor4119.exe 4484 cor4119.exe 1340 dSi86s60.exe 1340 dSi86s60.exe 508 en361019.exe 508 en361019.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
az368745.execor4119.exedSi86s60.exeen361019.exedescription pid process Token: SeDebugPrivilege 2056 az368745.exe Token: SeDebugPrivilege 4484 cor4119.exe Token: SeDebugPrivilege 1340 dSi86s60.exe Token: SeDebugPrivilege 508 en361019.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
bu817472.exepid process 4376 bu817472.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exekina8176.exekina6447.exekina3405.exebu817472.exeoneetx.exedescription pid process target process PID 2868 wrote to memory of 1480 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe kina8176.exe PID 2868 wrote to memory of 1480 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe kina8176.exe PID 2868 wrote to memory of 1480 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe kina8176.exe PID 1480 wrote to memory of 632 1480 kina8176.exe kina6447.exe PID 1480 wrote to memory of 632 1480 kina8176.exe kina6447.exe PID 1480 wrote to memory of 632 1480 kina8176.exe kina6447.exe PID 632 wrote to memory of 1324 632 kina6447.exe kina3405.exe PID 632 wrote to memory of 1324 632 kina6447.exe kina3405.exe PID 632 wrote to memory of 1324 632 kina6447.exe kina3405.exe PID 1324 wrote to memory of 2056 1324 kina3405.exe az368745.exe PID 1324 wrote to memory of 2056 1324 kina3405.exe az368745.exe PID 1324 wrote to memory of 4376 1324 kina3405.exe bu817472.exe PID 1324 wrote to memory of 4376 1324 kina3405.exe bu817472.exe PID 1324 wrote to memory of 4376 1324 kina3405.exe bu817472.exe PID 4376 wrote to memory of 2660 4376 bu817472.exe oneetx.exe PID 4376 wrote to memory of 2660 4376 bu817472.exe oneetx.exe PID 4376 wrote to memory of 2660 4376 bu817472.exe oneetx.exe PID 632 wrote to memory of 4484 632 kina6447.exe cor4119.exe PID 632 wrote to memory of 4484 632 kina6447.exe cor4119.exe PID 632 wrote to memory of 4484 632 kina6447.exe cor4119.exe PID 2660 wrote to memory of 2056 2660 oneetx.exe schtasks.exe PID 2660 wrote to memory of 2056 2660 oneetx.exe schtasks.exe PID 2660 wrote to memory of 2056 2660 oneetx.exe schtasks.exe PID 1480 wrote to memory of 1340 1480 kina8176.exe dSi86s60.exe PID 1480 wrote to memory of 1340 1480 kina8176.exe dSi86s60.exe PID 1480 wrote to memory of 1340 1480 kina8176.exe dSi86s60.exe PID 2868 wrote to memory of 508 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe en361019.exe PID 2868 wrote to memory of 508 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe en361019.exe PID 2868 wrote to memory of 508 2868 1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe en361019.exe PID 2660 wrote to memory of 1096 2660 oneetx.exe rundll32.exe PID 2660 wrote to memory of 1096 2660 oneetx.exe rundll32.exe PID 2660 wrote to memory of 1096 2660 oneetx.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe"C:\Users\Admin\AppData\Local\Temp\1a49cf0bd4b9b9952c9024f119ddef8d92f1f7336bdd95b6f2c397f3c8b62a3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8176.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8176.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6447.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6447.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3405.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3405.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az368745.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az368745.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu817472.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu817472.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 6966⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 7926⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 8566⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9566⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9566⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 9806⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 12246⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 12446⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 13246⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 6927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 8847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10207⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 9847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10967⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 8927⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 11287⤵
- Program crash
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe" /F7⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 8007⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 12847⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10087⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 14327⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 11527⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 16247⤵
- Program crash
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 10887⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 16367⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 14086⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4119.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4119.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 10925⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSi86s60.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSi86s60.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 13324⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en361019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en361019.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 4376 -ip 43761⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 592 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4484 -ip 44841⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 3202⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1484 -ip 14841⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 1340 -ip 13401⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2660 -ip 26601⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 2660 -ip 26601⤵
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeC:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exe1⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3916 -s 2162⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3916 -ip 39161⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2660 -ip 26601⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\595f021478\oneetx.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en361019.exeFilesize
168KB
MD53242e8bfaa6f4d69a7363111ef468d82
SHA1b9c5188bc65af36e3509021c1127f1fc01228fc6
SHA256a54693f394365a11b3c2637755a7724fe30794c3b2ef1714cedb2dbe8211bfd2
SHA51286e491e5213019a9f5b68986898de4f1efc47a7e4d8ff5f5097922448160112d05ee9e3ed8d15e6f710f53587f3692a3a00cecda241703df902cbfd4275c04da
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\en361019.exeFilesize
168KB
MD53242e8bfaa6f4d69a7363111ef468d82
SHA1b9c5188bc65af36e3509021c1127f1fc01228fc6
SHA256a54693f394365a11b3c2637755a7724fe30794c3b2ef1714cedb2dbe8211bfd2
SHA51286e491e5213019a9f5b68986898de4f1efc47a7e4d8ff5f5097922448160112d05ee9e3ed8d15e6f710f53587f3692a3a00cecda241703df902cbfd4275c04da
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8176.exeFilesize
919KB
MD58f91ff494d122beb14491e04c99bbb47
SHA1f0046f07fa75e48718d8c939075f58cdce9e2201
SHA256dffa977ee8403337bb0e8c371e7de89e28bfdaf79307538dda2e198d1e04ee23
SHA512bb2d3be0ec939c25d9f3b83128a49be387287678d5b7249f3dbb3c339d6ee32194787ffea3fd2aa84a13f8e121c2e2d6c2b5810dd89834e282ab58fc9f2d99ab
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8176.exeFilesize
919KB
MD58f91ff494d122beb14491e04c99bbb47
SHA1f0046f07fa75e48718d8c939075f58cdce9e2201
SHA256dffa977ee8403337bb0e8c371e7de89e28bfdaf79307538dda2e198d1e04ee23
SHA512bb2d3be0ec939c25d9f3b83128a49be387287678d5b7249f3dbb3c339d6ee32194787ffea3fd2aa84a13f8e121c2e2d6c2b5810dd89834e282ab58fc9f2d99ab
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSi86s60.exeFilesize
297KB
MD5172314b609f7f21f9b002557c1befec0
SHA1eef9d926736a31f3ba9c08485c895fb0b8be5fe3
SHA2564cb22509ba0b2c67f3b573fe3964e45913bf7ced37a78c4b657e284a2b122d12
SHA512f076c1ae37f80e9cb6cd2f008adb9ee2a67516ab1ef6bf6e06e2127d95311720cf691039416c0969fd46d3a215f9ba172a5eda5b06e265df847d78057f7394cb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dSi86s60.exeFilesize
297KB
MD5172314b609f7f21f9b002557c1befec0
SHA1eef9d926736a31f3ba9c08485c895fb0b8be5fe3
SHA2564cb22509ba0b2c67f3b573fe3964e45913bf7ced37a78c4b657e284a2b122d12
SHA512f076c1ae37f80e9cb6cd2f008adb9ee2a67516ab1ef6bf6e06e2127d95311720cf691039416c0969fd46d3a215f9ba172a5eda5b06e265df847d78057f7394cb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6447.exeFilesize
589KB
MD571992d2683506ca1db8d9708cd870d6d
SHA178ebf7e6b26a9d3813f9f87e7a9e28902719e4a6
SHA256b346b5841a482274f62697f4f8c8974c04030cbbae8fe5296bb87a87d99f725a
SHA512b207a9996b680aed481b8cb4ed19e56fe65234874900fee4a55352815421eeed7dba29dc0082ee4a69d9729e1230106860d251a214b8d3033344cb5298c7c387
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina6447.exeFilesize
589KB
MD571992d2683506ca1db8d9708cd870d6d
SHA178ebf7e6b26a9d3813f9f87e7a9e28902719e4a6
SHA256b346b5841a482274f62697f4f8c8974c04030cbbae8fe5296bb87a87d99f725a
SHA512b207a9996b680aed481b8cb4ed19e56fe65234874900fee4a55352815421eeed7dba29dc0082ee4a69d9729e1230106860d251a214b8d3033344cb5298c7c387
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4119.exeFilesize
239KB
MD56b36098af1ad9f74a2dd972eaf99583c
SHA19d1dbfd94d862255880a2903e90d81471722d42a
SHA256775444af402b6caabad5e35b11632096f74f5d6f19758b1841e06d9afd98f745
SHA512d26198d54ae134c7bd775fba87cdafdf30db263739f8b47dbdc59dcb8d39706746b6005560ce628e595a073d062f3eeed5d6622e6af09ef761891a0da8128ca3
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\cor4119.exeFilesize
239KB
MD56b36098af1ad9f74a2dd972eaf99583c
SHA19d1dbfd94d862255880a2903e90d81471722d42a
SHA256775444af402b6caabad5e35b11632096f74f5d6f19758b1841e06d9afd98f745
SHA512d26198d54ae134c7bd775fba87cdafdf30db263739f8b47dbdc59dcb8d39706746b6005560ce628e595a073d062f3eeed5d6622e6af09ef761891a0da8128ca3
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3405.exeFilesize
316KB
MD57b2695c23420dd81780f52038fbbb150
SHA1e903e31a138138939c30971133a5a2ce7de6706d
SHA25658fb8c7283854a2f054cf6ea78ef08b84fee942f8d91fe38061de8edf55a9930
SHA51233615f4b6827a4ab84dec66c021044324f7e1f67eb665004e84f21f961501a51a463b43b6420d41e275d251ad506ec091c95122f9225fbc2e56d941398caae24
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina3405.exeFilesize
316KB
MD57b2695c23420dd81780f52038fbbb150
SHA1e903e31a138138939c30971133a5a2ce7de6706d
SHA25658fb8c7283854a2f054cf6ea78ef08b84fee942f8d91fe38061de8edf55a9930
SHA51233615f4b6827a4ab84dec66c021044324f7e1f67eb665004e84f21f961501a51a463b43b6420d41e275d251ad506ec091c95122f9225fbc2e56d941398caae24
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az368745.exeFilesize
11KB
MD50fe493f0f347b8089dbc43a538092cfe
SHA1c220487ba7b6902343b0b296dac516e84a3a9f89
SHA25612579fd0f7dd2f300d4acf44897044f58343fd285a4cbf6b7ca8ccdfc8858c01
SHA51211efcdf1bd56363e5c0d3dc24f1931da8892db5f1fc3121cde92cd1f07005badc59e416db6e5a170097fa24c67116b24d9a2402d80bfe7c5b2c039f4cf303f7f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\az368745.exeFilesize
11KB
MD50fe493f0f347b8089dbc43a538092cfe
SHA1c220487ba7b6902343b0b296dac516e84a3a9f89
SHA25612579fd0f7dd2f300d4acf44897044f58343fd285a4cbf6b7ca8ccdfc8858c01
SHA51211efcdf1bd56363e5c0d3dc24f1931da8892db5f1fc3121cde92cd1f07005badc59e416db6e5a170097fa24c67116b24d9a2402d80bfe7c5b2c039f4cf303f7f
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu817472.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu817472.exeFilesize
231KB
MD55a531a1495614605383afe7a35731a7a
SHA1f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6
SHA2562aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d
SHA512906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD54061d8dd5006b99d06fa208c0063dfcf
SHA138e7df8d8e631f3e9b227df3b9326d187e18cce5
SHA256b380dd44db67571959bc5f04a5d9c1ec51e48c0617c59e7c4bcbf794a90320f0
SHA51271de12e3bcf0ff4996b71587d971f0b4e378397ffac22be28d4e41c7c865a85bbcff62cfa7bdfa6e18d19971205bf0021939ac49dec42daa749d4ac9f7e70314
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
memory/508-1169-0x0000000005470000-0x0000000005480000-memory.dmpFilesize
64KB
-
memory/508-1168-0x0000000000B80000-0x0000000000BB0000-memory.dmpFilesize
192KB
-
memory/1340-267-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-1153-0x0000000006270000-0x0000000006302000-memory.dmpFilesize
584KB
-
memory/1340-1161-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-1160-0x0000000006730000-0x0000000006C5C000-memory.dmpFilesize
5.2MB
-
memory/1340-1159-0x0000000006560000-0x0000000006722000-memory.dmpFilesize
1.8MB
-
memory/1340-1158-0x00000000064F0000-0x0000000006540000-memory.dmpFilesize
320KB
-
memory/1340-1157-0x0000000006470000-0x00000000064E6000-memory.dmpFilesize
472KB
-
memory/1340-1156-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-1155-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-1154-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-1152-0x0000000005BB0000-0x0000000005C16000-memory.dmpFilesize
408KB
-
memory/1340-1148-0x00000000058D0000-0x000000000590C000-memory.dmpFilesize
240KB
-
memory/1340-1147-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-1146-0x0000000004CC0000-0x0000000004CD2000-memory.dmpFilesize
72KB
-
memory/1340-1145-0x0000000004B80000-0x0000000004C8A000-memory.dmpFilesize
1.0MB
-
memory/1340-1144-0x00000000052B0000-0x00000000058C8000-memory.dmpFilesize
6.1MB
-
memory/1340-265-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-263-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-261-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-259-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-234-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-235-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-237-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-239-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-241-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-244-0x00000000005A0000-0x00000000005EB000-memory.dmpFilesize
300KB
-
memory/1340-246-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-247-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-250-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-251-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-248-0x0000000004CF0000-0x0000000004D00000-memory.dmpFilesize
64KB
-
memory/1340-253-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-243-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-255-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/1340-257-0x0000000002360000-0x000000000239F000-memory.dmpFilesize
252KB
-
memory/2056-161-0x0000000000330000-0x000000000033A000-memory.dmpFilesize
40KB
-
memory/2660-221-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/4376-167-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/4376-182-0x0000000000400000-0x00000000004A8000-memory.dmpFilesize
672KB
-
memory/4376-184-0x00000000004B0000-0x00000000004EB000-memory.dmpFilesize
236KB
-
memory/4484-214-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-210-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-223-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4484-222-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4484-225-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4484-220-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-202-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-218-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-216-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-197-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4484-212-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-224-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4484-208-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-206-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-204-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-195-0x0000000004C10000-0x0000000004C20000-memory.dmpFilesize
64KB
-
memory/4484-191-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-193-0x00000000005C0000-0x00000000005ED000-memory.dmpFilesize
180KB
-
memory/4484-190-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-189-0x0000000004C20000-0x00000000051C4000-memory.dmpFilesize
5.6MB
-
memory/4484-194-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-227-0x0000000000400000-0x00000000004AA000-memory.dmpFilesize
680KB
-
memory/4484-200-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB
-
memory/4484-198-0x0000000004A20000-0x0000000004A32000-memory.dmpFilesize
72KB