Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 07:50
Static task
static1
Behavioral task
behavioral1
Sample
c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe
Resource
win7-20230831-en
General
-
Target
c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe
-
Size
1.3MB
-
MD5
5ca2ff392d65df585e75bd126eb85639
-
SHA1
ffccf331f43db1c6d24c1d59dedace9f18f236f8
-
SHA256
c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d
-
SHA512
2aa2b0682aa7b91187e726b68314df539619bf2221acbe457c9e86b35c7b33a2b582937aba483bb66105706f4b9092987dc7607956ebc8f0b956da0a9515fafa
-
SSDEEP
24576:Zymrs/l32IpEDXBsHnqb6qRNQEDs5AHcmQBBhFQyYoOIOSZFvFt/ks67O6KdDIhX:MrlmIiriHqPR6EDVbQIyYoOIv/t0660S
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/3472-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3472-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3472-43-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/3472-45-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5092-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
t4921606.exeexplonde.exeu4711548.exelegota.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation t4921606.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation u4711548.exe Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation legota.exe -
Executes dropped EXE 16 IoCs
Processes:
z1801849.exez3840671.exez7053934.exez2916556.exeq9215764.exer6891722.exes5871697.exet4921606.exeexplonde.exeu4711548.exelegota.exew5197387.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 4244 z1801849.exe 880 z3840671.exe 8 z7053934.exe 2112 z2916556.exe 4820 q9215764.exe 4700 r6891722.exe 3920 s5871697.exe 4004 t4921606.exe 1420 explonde.exe 2408 u4711548.exe 3212 legota.exe 1660 w5197387.exe 2104 explonde.exe 3148 legota.exe 1828 explonde.exe 4084 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3768 rundll32.exe 2108 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exez1801849.exez3840671.exez7053934.exez2916556.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1801849.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z3840671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z7053934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z2916556.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q9215764.exer6891722.exes5871697.exedescription pid process target process PID 4820 set thread context of 5092 4820 q9215764.exe AppLaunch.exe PID 4700 set thread context of 3472 4700 r6891722.exe AppLaunch.exe PID 3920 set thread context of 3068 3920 s5871697.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 5012 4820 WerFault.exe q9215764.exe 3580 4700 WerFault.exe r6891722.exe 4960 3472 WerFault.exe AppLaunch.exe 4672 3920 WerFault.exe s5871697.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2488 schtasks.exe 4468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 5092 AppLaunch.exe 5092 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 5092 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exez1801849.exez3840671.exez7053934.exez2916556.exeq9215764.exer6891722.exes5871697.exet4921606.exeexplonde.exeu4711548.exedescription pid process target process PID 5016 wrote to memory of 4244 5016 c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe z1801849.exe PID 5016 wrote to memory of 4244 5016 c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe z1801849.exe PID 5016 wrote to memory of 4244 5016 c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe z1801849.exe PID 4244 wrote to memory of 880 4244 z1801849.exe z3840671.exe PID 4244 wrote to memory of 880 4244 z1801849.exe z3840671.exe PID 4244 wrote to memory of 880 4244 z1801849.exe z3840671.exe PID 880 wrote to memory of 8 880 z3840671.exe z7053934.exe PID 880 wrote to memory of 8 880 z3840671.exe z7053934.exe PID 880 wrote to memory of 8 880 z3840671.exe z7053934.exe PID 8 wrote to memory of 2112 8 z7053934.exe z2916556.exe PID 8 wrote to memory of 2112 8 z7053934.exe z2916556.exe PID 8 wrote to memory of 2112 8 z7053934.exe z2916556.exe PID 2112 wrote to memory of 4820 2112 z2916556.exe q9215764.exe PID 2112 wrote to memory of 4820 2112 z2916556.exe q9215764.exe PID 2112 wrote to memory of 4820 2112 z2916556.exe q9215764.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 4820 wrote to memory of 5092 4820 q9215764.exe AppLaunch.exe PID 2112 wrote to memory of 4700 2112 z2916556.exe r6891722.exe PID 2112 wrote to memory of 4700 2112 z2916556.exe r6891722.exe PID 2112 wrote to memory of 4700 2112 z2916556.exe r6891722.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 4700 wrote to memory of 3472 4700 r6891722.exe AppLaunch.exe PID 8 wrote to memory of 3920 8 z7053934.exe s5871697.exe PID 8 wrote to memory of 3920 8 z7053934.exe s5871697.exe PID 8 wrote to memory of 3920 8 z7053934.exe s5871697.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 3920 wrote to memory of 3068 3920 s5871697.exe AppLaunch.exe PID 880 wrote to memory of 4004 880 z3840671.exe t4921606.exe PID 880 wrote to memory of 4004 880 z3840671.exe t4921606.exe PID 880 wrote to memory of 4004 880 z3840671.exe t4921606.exe PID 4004 wrote to memory of 1420 4004 t4921606.exe explonde.exe PID 4004 wrote to memory of 1420 4004 t4921606.exe explonde.exe PID 4004 wrote to memory of 1420 4004 t4921606.exe explonde.exe PID 4244 wrote to memory of 2408 4244 z1801849.exe u4711548.exe PID 4244 wrote to memory of 2408 4244 z1801849.exe u4711548.exe PID 4244 wrote to memory of 2408 4244 z1801849.exe u4711548.exe PID 1420 wrote to memory of 4468 1420 explonde.exe schtasks.exe PID 1420 wrote to memory of 4468 1420 explonde.exe schtasks.exe PID 1420 wrote to memory of 4468 1420 explonde.exe schtasks.exe PID 2408 wrote to memory of 3212 2408 u4711548.exe legota.exe PID 2408 wrote to memory of 3212 2408 u4711548.exe legota.exe PID 2408 wrote to memory of 3212 2408 u4711548.exe legota.exe PID 5016 wrote to memory of 1660 5016 c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe w5197387.exe PID 5016 wrote to memory of 1660 5016 c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe w5197387.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe"C:\Users\Admin\AppData\Local\Temp\c0294232f03a91c23481fd13d43f1a6fd58e8473a6f5b373ed5730ee17aaf53d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1801849.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1801849.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3840671.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3840671.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7053934.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7053934.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2916556.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2916556.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9215764.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9215764.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 5967⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6891722.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6891722.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 5408⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4700 -s 1527⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5871697.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5871697.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 1486⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4921606.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4921606.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4711548.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4711548.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5197387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5197387.exe2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4820 -ip 48201⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4700 -ip 47001⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3472 -ip 34721⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3920 -ip 39201⤵
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5197387.exeFilesize
22KB
MD513f95157652c6a9b2980c283b4a9fac4
SHA19bcd499243339ce8095620a40689bec329833e05
SHA256fef417808945c2a6a0a5b7c13558d8d2ca0ec26df23d9a788bb73a33a6dcabcf
SHA512b9dbaf14fd73896a6e3a200c12570d4f665ae08150d0e0da2b147d330979fa05923e1cd833c0ed4d9a17b570ecb4c4c85db0a938cf92c0438712e4d65861a3c9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w5197387.exeFilesize
22KB
MD513f95157652c6a9b2980c283b4a9fac4
SHA19bcd499243339ce8095620a40689bec329833e05
SHA256fef417808945c2a6a0a5b7c13558d8d2ca0ec26df23d9a788bb73a33a6dcabcf
SHA512b9dbaf14fd73896a6e3a200c12570d4f665ae08150d0e0da2b147d330979fa05923e1cd833c0ed4d9a17b570ecb4c4c85db0a938cf92c0438712e4d65861a3c9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1801849.exeFilesize
1.2MB
MD5b227489ccc3b25c1375e57f7cd772c2c
SHA1a7d3d7940e2b10791aa4ced516e6be0d272796b9
SHA256fab62793ede4980146f36b5ca901bcbe8e352010c751f14d415c1660506760b5
SHA5123ddde77312c3866a58ca98272a30e1b7b94b9ca54e436af4ea76468752c9e1fc721db05f940fbfe3f559b8afc02dc9dee55714d8858059e9c35af7cd13d1b295
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1801849.exeFilesize
1.2MB
MD5b227489ccc3b25c1375e57f7cd772c2c
SHA1a7d3d7940e2b10791aa4ced516e6be0d272796b9
SHA256fab62793ede4980146f36b5ca901bcbe8e352010c751f14d415c1660506760b5
SHA5123ddde77312c3866a58ca98272a30e1b7b94b9ca54e436af4ea76468752c9e1fc721db05f940fbfe3f559b8afc02dc9dee55714d8858059e9c35af7cd13d1b295
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4711548.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u4711548.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3840671.exeFilesize
1.0MB
MD56a7db8a3b7cbf9968befd9bb4c73aa88
SHA1c59af45924f6ba4a4514b54c5d730eb240e85fb3
SHA256a07553eb450f6b0c97ce5566150d34db1a011e67ab5e2f3a0a4155e0c0265dd8
SHA5129a869d7868dfd72a8eed0d6d6d48e4f68851b5016c4f0451e2623cb8c23706aa09d7e264612eafab1b6c80224842fbb7fac2afc2bb86f1fcdcb0a72182c69a44
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3840671.exeFilesize
1.0MB
MD56a7db8a3b7cbf9968befd9bb4c73aa88
SHA1c59af45924f6ba4a4514b54c5d730eb240e85fb3
SHA256a07553eb450f6b0c97ce5566150d34db1a011e67ab5e2f3a0a4155e0c0265dd8
SHA5129a869d7868dfd72a8eed0d6d6d48e4f68851b5016c4f0451e2623cb8c23706aa09d7e264612eafab1b6c80224842fbb7fac2afc2bb86f1fcdcb0a72182c69a44
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4921606.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t4921606.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7053934.exeFilesize
888KB
MD58714002dc6ab0eec9462e6f3f0e5070c
SHA12c78f5332a4d08a42b9b90f1690b4d43eddf6e76
SHA256dfabd829671504d0e179c2b408fecee2af624a07eb01adafdd90db001870fa80
SHA5120e46d1bfd396afcf7b2e3c278dc261ae10b947542f1e5b60b7f2581778f17ad9fd071d6feb7729209cf43fe6c4636338ddeb3313c71a04367af8159443e6d00a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z7053934.exeFilesize
888KB
MD58714002dc6ab0eec9462e6f3f0e5070c
SHA12c78f5332a4d08a42b9b90f1690b4d43eddf6e76
SHA256dfabd829671504d0e179c2b408fecee2af624a07eb01adafdd90db001870fa80
SHA5120e46d1bfd396afcf7b2e3c278dc261ae10b947542f1e5b60b7f2581778f17ad9fd071d6feb7729209cf43fe6c4636338ddeb3313c71a04367af8159443e6d00a
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5871697.exeFilesize
1.0MB
MD5b4a6e25625a716795f817213f116df4a
SHA15e099559d3b0e7f583c626fd7fed07469c7b05bd
SHA256d5e78c665a6e3a692a6c11a555f2c3546b006d89ded14deb151b6e088e587cdc
SHA512e186f0df69bf2e2a1305f41ddf8a2249402f9416fc0472f2958a6c9f6cc6561a78f33a51f7af2ecd4643a04a4642828043b37714ef5a7c23c98bcad8fb754b2c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5871697.exeFilesize
1.0MB
MD5b4a6e25625a716795f817213f116df4a
SHA15e099559d3b0e7f583c626fd7fed07469c7b05bd
SHA256d5e78c665a6e3a692a6c11a555f2c3546b006d89ded14deb151b6e088e587cdc
SHA512e186f0df69bf2e2a1305f41ddf8a2249402f9416fc0472f2958a6c9f6cc6561a78f33a51f7af2ecd4643a04a4642828043b37714ef5a7c23c98bcad8fb754b2c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2916556.exeFilesize
496KB
MD57a7162588da19b0b3ce2cfdbf094768c
SHA17c3033c8a03237fbf6c365011f9ef092c64dea8a
SHA25623cb3fd45c4e910b81c2117365996dc831c22b20308012ae882955c92e7b4717
SHA512b47332eb407a1d9dd3a9cb859d48bd476833755f074f8aa07c4310af7766fd1acb802668ceda52f4bacbc53abfffa6599890749915bd923e214079f881c3e95d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z2916556.exeFilesize
496KB
MD57a7162588da19b0b3ce2cfdbf094768c
SHA17c3033c8a03237fbf6c365011f9ef092c64dea8a
SHA25623cb3fd45c4e910b81c2117365996dc831c22b20308012ae882955c92e7b4717
SHA512b47332eb407a1d9dd3a9cb859d48bd476833755f074f8aa07c4310af7766fd1acb802668ceda52f4bacbc53abfffa6599890749915bd923e214079f881c3e95d
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9215764.exeFilesize
860KB
MD556b406d372f9546ffdde425077bf81e1
SHA1fc26daaecdb09bdee06cce26ae225c1dd29b33e3
SHA256a9a60784752949d7191e87c6e3530502d2ebcd4ffb1643435b5cb6c4ac5f35dd
SHA512d9a9937a0190e5f98f77b7d916dafdd55333a603b2ed36a103c6b4d528e57ab8446be4903606c556d741cb7830f9d5b269d7934141cebb373ecb53716329bf2e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q9215764.exeFilesize
860KB
MD556b406d372f9546ffdde425077bf81e1
SHA1fc26daaecdb09bdee06cce26ae225c1dd29b33e3
SHA256a9a60784752949d7191e87c6e3530502d2ebcd4ffb1643435b5cb6c4ac5f35dd
SHA512d9a9937a0190e5f98f77b7d916dafdd55333a603b2ed36a103c6b4d528e57ab8446be4903606c556d741cb7830f9d5b269d7934141cebb373ecb53716329bf2e
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6891722.exeFilesize
1016KB
MD52abb2cb4c4d62aeab5b8dd37b430e7a7
SHA1b5986cec796e1871c799cd5f94cae878637a89d8
SHA256e44f360f123abab2cf2775e9ac33f9e3eb218ce13bbe471289f7fc373c953abf
SHA5120aa4e453f32aaf1ea0d451d97788c1d0162aa56ffca8529e47cd905d98db51f20d2a31b89110734153719352132da4230ae6b9827b7695538d19363ce47d4606
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r6891722.exeFilesize
1016KB
MD52abb2cb4c4d62aeab5b8dd37b430e7a7
SHA1b5986cec796e1871c799cd5f94cae878637a89d8
SHA256e44f360f123abab2cf2775e9ac33f9e3eb218ce13bbe471289f7fc373c953abf
SHA5120aa4e453f32aaf1ea0d451d97788c1d0162aa56ffca8529e47cd905d98db51f20d2a31b89110734153719352132da4230ae6b9827b7695538d19363ce47d4606
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/3068-58-0x0000000004FA0000-0x00000000050AA000-memory.dmpFilesize
1.0MB
-
memory/3068-50-0x0000000000BC0000-0x0000000000BC6000-memory.dmpFilesize
24KB
-
memory/3068-61-0x0000000004E90000-0x0000000004ECC000-memory.dmpFilesize
240KB
-
memory/3068-59-0x0000000004E20000-0x0000000004E32000-memory.dmpFilesize
72KB
-
memory/3068-49-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/3068-87-0x0000000074290000-0x0000000074A40000-memory.dmpFilesize
7.7MB
-
memory/3068-88-0x0000000004E80000-0x0000000004E90000-memory.dmpFilesize
64KB
-
memory/3068-60-0x0000000004E80000-0x0000000004E90000-memory.dmpFilesize
64KB
-
memory/3068-55-0x00000000054B0000-0x0000000005AC8000-memory.dmpFilesize
6.1MB
-
memory/3068-62-0x0000000004EE0000-0x0000000004F2C000-memory.dmpFilesize
304KB
-
memory/3068-51-0x0000000074290000-0x0000000074A40000-memory.dmpFilesize
7.7MB
-
memory/3472-45-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3472-43-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3472-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3472-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/5092-86-0x0000000074290000-0x0000000074A40000-memory.dmpFilesize
7.7MB
-
memory/5092-37-0x0000000074290000-0x0000000074A40000-memory.dmpFilesize
7.7MB
-
memory/5092-36-0x0000000074290000-0x0000000074A40000-memory.dmpFilesize
7.7MB
-
memory/5092-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB