Analysis
-
max time kernel
166s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:08
Static task
static1
Behavioral task
behavioral1
Sample
dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe
Resource
win7-20230831-en
General
-
Target
dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe
-
Size
1.3MB
-
MD5
f63caee5b7e7ef9381d364a3c86ed0cf
-
SHA1
c8d9187fc19b89d1726cb8edd1d5760ff2a54596
-
SHA256
dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169
-
SHA512
bc76c893aa80876d5dcf96ed88b3c482d99000278e76b61abe7720f399465c35b870016edb07daefd0a3739e3d94b323161de2d84aecebc61c81a91cfa0c3502
-
SSDEEP
24576:HyBg5hWxUETw4hVVv3fHZGbrgy/YlfQVF3vTrQ2B5KNKIo41LKUk:SBg/9Es4fN3fHZMFKfOFffjB5F4NKU
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4912-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4912-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4912-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4912-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3852-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t4230383.exeexplonde.exeu9565137.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t4230383.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u9565137.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 18 IoCs
Processes:
z9575424.exez8988669.exez5213238.exez6163250.exeq3039249.exer8512680.exes5141940.exet4230383.exeexplonde.exeu9565137.exelegota.exew0026848.exeexplonde.exelegota.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 3512 z9575424.exe 264 z8988669.exe 4376 z5213238.exe 2828 z6163250.exe 3904 q3039249.exe 2700 r8512680.exe 1224 s5141940.exe 1388 t4230383.exe 3684 explonde.exe 2164 u9565137.exe 3792 legota.exe 4984 w0026848.exe 2116 explonde.exe 2628 legota.exe 652 explonde.exe 4136 legota.exe 1088 explonde.exe 2768 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3404 rundll32.exe 4244 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exez9575424.exez8988669.exez5213238.exez6163250.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9575424.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8988669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5213238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z6163250.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q3039249.exer8512680.exes5141940.exedescription pid process target process PID 3904 set thread context of 3852 3904 q3039249.exe AppLaunch.exe PID 2700 set thread context of 4912 2700 r8512680.exe AppLaunch.exe PID 1224 set thread context of 4412 1224 s5141940.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4176 3904 WerFault.exe q3039249.exe 1580 2700 WerFault.exe r8512680.exe 3712 4912 WerFault.exe AppLaunch.exe 2144 1224 WerFault.exe s5141940.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 4620 schtasks.exe 4988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3852 AppLaunch.exe 3852 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3852 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exez9575424.exez8988669.exez5213238.exez6163250.exeq3039249.exer8512680.exes5141940.exet4230383.exeexplonde.exeu9565137.exedescription pid process target process PID 1528 wrote to memory of 3512 1528 dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe z9575424.exe PID 1528 wrote to memory of 3512 1528 dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe z9575424.exe PID 1528 wrote to memory of 3512 1528 dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe z9575424.exe PID 3512 wrote to memory of 264 3512 z9575424.exe z8988669.exe PID 3512 wrote to memory of 264 3512 z9575424.exe z8988669.exe PID 3512 wrote to memory of 264 3512 z9575424.exe z8988669.exe PID 264 wrote to memory of 4376 264 z8988669.exe z5213238.exe PID 264 wrote to memory of 4376 264 z8988669.exe z5213238.exe PID 264 wrote to memory of 4376 264 z8988669.exe z5213238.exe PID 4376 wrote to memory of 2828 4376 z5213238.exe z6163250.exe PID 4376 wrote to memory of 2828 4376 z5213238.exe z6163250.exe PID 4376 wrote to memory of 2828 4376 z5213238.exe z6163250.exe PID 2828 wrote to memory of 3904 2828 z6163250.exe q3039249.exe PID 2828 wrote to memory of 3904 2828 z6163250.exe q3039249.exe PID 2828 wrote to memory of 3904 2828 z6163250.exe q3039249.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 3904 wrote to memory of 3852 3904 q3039249.exe AppLaunch.exe PID 2828 wrote to memory of 2700 2828 z6163250.exe r8512680.exe PID 2828 wrote to memory of 2700 2828 z6163250.exe r8512680.exe PID 2828 wrote to memory of 2700 2828 z6163250.exe r8512680.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 2700 wrote to memory of 4912 2700 r8512680.exe AppLaunch.exe PID 4376 wrote to memory of 1224 4376 z5213238.exe s5141940.exe PID 4376 wrote to memory of 1224 4376 z5213238.exe s5141940.exe PID 4376 wrote to memory of 1224 4376 z5213238.exe s5141940.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 1224 wrote to memory of 4412 1224 s5141940.exe AppLaunch.exe PID 264 wrote to memory of 1388 264 z8988669.exe t4230383.exe PID 264 wrote to memory of 1388 264 z8988669.exe t4230383.exe PID 264 wrote to memory of 1388 264 z8988669.exe t4230383.exe PID 1388 wrote to memory of 3684 1388 t4230383.exe explonde.exe PID 1388 wrote to memory of 3684 1388 t4230383.exe explonde.exe PID 1388 wrote to memory of 3684 1388 t4230383.exe explonde.exe PID 3512 wrote to memory of 2164 3512 z9575424.exe u9565137.exe PID 3512 wrote to memory of 2164 3512 z9575424.exe u9565137.exe PID 3512 wrote to memory of 2164 3512 z9575424.exe u9565137.exe PID 3684 wrote to memory of 4620 3684 explonde.exe schtasks.exe PID 3684 wrote to memory of 4620 3684 explonde.exe schtasks.exe PID 3684 wrote to memory of 4620 3684 explonde.exe schtasks.exe PID 2164 wrote to memory of 3792 2164 u9565137.exe legota.exe PID 2164 wrote to memory of 3792 2164 u9565137.exe legota.exe PID 2164 wrote to memory of 3792 2164 u9565137.exe legota.exe PID 3684 wrote to memory of 4692 3684 explonde.exe cmd.exe PID 3684 wrote to memory of 4692 3684 explonde.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe"C:\Users\Admin\AppData\Local\Temp\dd4a4c70d5921b7a6a0d78504de133d35e778154cddf672ff98a4c6f3e5a3169.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9575424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9575424.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8988669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8988669.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5213238.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5213238.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6163250.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6163250.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3039249.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3039249.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 1527⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8512680.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8512680.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4912 -s 5408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1487⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5141940.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5141940.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 1486⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4230383.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4230383.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9565137.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9565137.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0026848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0026848.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3904 -ip 39041⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2700 -ip 27001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4912 -ip 49121⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1224 -ip 12241⤵
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0026848.exeFilesize
22KB
MD598a4e5ed43a4d36f24b2275d766fdfa4
SHA103fa9918f978bb62a6bff618ee88bfa249747e77
SHA256757a582d03c73da56bc299f4bfdf9b7921ed50e58df50a0ca70848cb3d8b3539
SHA5128166d8cfcdffa8327f492f7818436ee70ff6ed4927aef7ef9bc6ddf6892052249ccf1b413a10d83416b23aefa1cb2e13e8319fe418ac2e544db6298d78011d7b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0026848.exeFilesize
22KB
MD598a4e5ed43a4d36f24b2275d766fdfa4
SHA103fa9918f978bb62a6bff618ee88bfa249747e77
SHA256757a582d03c73da56bc299f4bfdf9b7921ed50e58df50a0ca70848cb3d8b3539
SHA5128166d8cfcdffa8327f492f7818436ee70ff6ed4927aef7ef9bc6ddf6892052249ccf1b413a10d83416b23aefa1cb2e13e8319fe418ac2e544db6298d78011d7b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9575424.exeFilesize
1.2MB
MD5520f0ed4a5dcdd7355f9f296a0eef29b
SHA117e3bf57a31e33b15aa0e88871eb3ea2326cb896
SHA256adb3a7ac46c10b0b7f7e26e49c16f55b29bc365d375e73b8863ab1aea577d743
SHA512f0d8e211fc16f376abf372815446d3c63c828683fb8eb4694ef2e0fadf3115b7e036845244fd5ff6d3f2094f6cde7c91ed89ec7a642d1aeee04f604c355566e0
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9575424.exeFilesize
1.2MB
MD5520f0ed4a5dcdd7355f9f296a0eef29b
SHA117e3bf57a31e33b15aa0e88871eb3ea2326cb896
SHA256adb3a7ac46c10b0b7f7e26e49c16f55b29bc365d375e73b8863ab1aea577d743
SHA512f0d8e211fc16f376abf372815446d3c63c828683fb8eb4694ef2e0fadf3115b7e036845244fd5ff6d3f2094f6cde7c91ed89ec7a642d1aeee04f604c355566e0
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9565137.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u9565137.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8988669.exeFilesize
1.0MB
MD54991ef6980006065eacb54c695c10501
SHA1d0d5f348fa22a70d27a83a5a10b4ee577de80c7f
SHA256302e2750eba5fd72c14170f4a4f55df856f03f410507c39a2a427ed80a8d5260
SHA512bdf48a32f20b904e23dca017dfd8ee711dd29b4ea62280f6172fc3cec2cd2b4f02a2ff3d7c0d2d65bd1c92ba63c9fcd79cc660792e03660d433dd29800134d71
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8988669.exeFilesize
1.0MB
MD54991ef6980006065eacb54c695c10501
SHA1d0d5f348fa22a70d27a83a5a10b4ee577de80c7f
SHA256302e2750eba5fd72c14170f4a4f55df856f03f410507c39a2a427ed80a8d5260
SHA512bdf48a32f20b904e23dca017dfd8ee711dd29b4ea62280f6172fc3cec2cd2b4f02a2ff3d7c0d2d65bd1c92ba63c9fcd79cc660792e03660d433dd29800134d71
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4230383.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4230383.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5213238.exeFilesize
880KB
MD5b652263d82c2221844103b5d27a77c97
SHA12c7efb260540b6b675e8eb428379ea8362dd80e4
SHA2562d57a8b3a7122a5538cfb135acb5584169a04dcd00e575ef6b016e037aa8f1fd
SHA51258c2fc58943f68e8add84325c29ab15067861d62eb36a3b794703f2248e1af73fcae48fbabcf1e6c10cc60312d4dab1b0343fd3f21ab1f3a2da234bb73cc3dee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5213238.exeFilesize
880KB
MD5b652263d82c2221844103b5d27a77c97
SHA12c7efb260540b6b675e8eb428379ea8362dd80e4
SHA2562d57a8b3a7122a5538cfb135acb5584169a04dcd00e575ef6b016e037aa8f1fd
SHA51258c2fc58943f68e8add84325c29ab15067861d62eb36a3b794703f2248e1af73fcae48fbabcf1e6c10cc60312d4dab1b0343fd3f21ab1f3a2da234bb73cc3dee
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5141940.exeFilesize
1.0MB
MD5a78c0448cfe85cb44547f0f87724ab73
SHA1dc09b82a5765dc1b56aee7edd93b5f1ccd0e3efd
SHA2563ed138c1a33b174a1990cf099fbbcb05f45768bcc722bfcce0c328922c5cc20d
SHA512076c2f6139b413a19e9f732fa056ae3e8f94e706f329994ff750bee86f06297f85d8ec264ba0304183a5f947cda998758353bcb7df43a9935e9fff99b0e7a413
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5141940.exeFilesize
1.0MB
MD5a78c0448cfe85cb44547f0f87724ab73
SHA1dc09b82a5765dc1b56aee7edd93b5f1ccd0e3efd
SHA2563ed138c1a33b174a1990cf099fbbcb05f45768bcc722bfcce0c328922c5cc20d
SHA512076c2f6139b413a19e9f732fa056ae3e8f94e706f329994ff750bee86f06297f85d8ec264ba0304183a5f947cda998758353bcb7df43a9935e9fff99b0e7a413
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6163250.exeFilesize
489KB
MD57087ebe4b1860a20cdc6b9efb8893aa3
SHA1a8eb6a1a579ac67d12c136e6031a3829d000e841
SHA256f05c44dbb1f3cf89c2b7426294f4520a0b606406531f2c91cdc451e9fc09de6c
SHA512be7f1724b10394449aa92372dc9832e192b456e39f73ac6208d65e13e706939e67b2c11ba7d2d54a85d8737773d77fc2ca7dc6a411beb3a53ea3c82cfad310a8
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z6163250.exeFilesize
489KB
MD57087ebe4b1860a20cdc6b9efb8893aa3
SHA1a8eb6a1a579ac67d12c136e6031a3829d000e841
SHA256f05c44dbb1f3cf89c2b7426294f4520a0b606406531f2c91cdc451e9fc09de6c
SHA512be7f1724b10394449aa92372dc9832e192b456e39f73ac6208d65e13e706939e67b2c11ba7d2d54a85d8737773d77fc2ca7dc6a411beb3a53ea3c82cfad310a8
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3039249.exeFilesize
860KB
MD5b9015bb1665e509a74701062fd48c8a2
SHA13f006df34dd7e5d11d6f36e9240ea59d1518d425
SHA256e1c2cbb0bd7d69a6dcdb7ad9f8157fad36169b8a28777399bf8c1002fc0a54de
SHA512c04bd9f244f78e84dd16bce4bdc0967d4adfc9a3a4f9696b90dc34ecbfbaeafab43151e33d3e327ec07c28a1a781ded25957bbe72ba79739217fc23b1abea673
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q3039249.exeFilesize
860KB
MD5b9015bb1665e509a74701062fd48c8a2
SHA13f006df34dd7e5d11d6f36e9240ea59d1518d425
SHA256e1c2cbb0bd7d69a6dcdb7ad9f8157fad36169b8a28777399bf8c1002fc0a54de
SHA512c04bd9f244f78e84dd16bce4bdc0967d4adfc9a3a4f9696b90dc34ecbfbaeafab43151e33d3e327ec07c28a1a781ded25957bbe72ba79739217fc23b1abea673
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8512680.exeFilesize
1016KB
MD513f92620f0418d69424a799befba61df
SHA1a9e97b337f456ffa3f778c4dc0942b92953e2448
SHA2565596402c44efdc5a403083f0564ac53c4dbc6349feda59c77e0cbc81deb4562c
SHA5126a21caee2f177b7b24ea6c2644e2fd7a64b83ca39e753d0232a87fcbf7fcc1890c08783086c735e82be6f6d5f63e1f032153e6431e1df1ede8db5576de7c744c
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r8512680.exeFilesize
1016KB
MD513f92620f0418d69424a799befba61df
SHA1a9e97b337f456ffa3f778c4dc0942b92953e2448
SHA2565596402c44efdc5a403083f0564ac53c4dbc6349feda59c77e0cbc81deb4562c
SHA5126a21caee2f177b7b24ea6c2644e2fd7a64b83ca39e753d0232a87fcbf7fcc1890c08783086c735e82be6f6d5f63e1f032153e6431e1df1ede8db5576de7c744c
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/3852-36-0x0000000074720000-0x0000000074ED0000-memory.dmpFilesize
7.7MB
-
memory/3852-84-0x0000000074720000-0x0000000074ED0000-memory.dmpFilesize
7.7MB
-
memory/3852-86-0x0000000074720000-0x0000000074ED0000-memory.dmpFilesize
7.7MB
-
memory/3852-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4412-59-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/4412-88-0x0000000004DF0000-0x0000000004E00000-memory.dmpFilesize
64KB
-
memory/4412-87-0x0000000074720000-0x0000000074ED0000-memory.dmpFilesize
7.7MB
-
memory/4412-68-0x000000000A3B0000-0x000000000A3FC000-memory.dmpFilesize
304KB
-
memory/4412-64-0x000000000A230000-0x000000000A26C000-memory.dmpFilesize
240KB
-
memory/4412-58-0x000000000A1D0000-0x000000000A1E2000-memory.dmpFilesize
72KB
-
memory/4412-57-0x000000000A2A0000-0x000000000A3AA000-memory.dmpFilesize
1.0MB
-
memory/4412-56-0x000000000A7A0000-0x000000000ADB8000-memory.dmpFilesize
6.1MB
-
memory/4412-49-0x0000000000C60000-0x0000000000C66000-memory.dmpFilesize
24KB
-
memory/4412-50-0x0000000074720000-0x0000000074ED0000-memory.dmpFilesize
7.7MB
-
memory/4412-48-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4912-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4912-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4912-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4912-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB