Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 08:24
Static task
static1
Behavioral task
behavioral1
Sample
7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe
Resource
win7-20230831-en
General
-
Target
7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe
-
Size
1.0MB
-
MD5
91a7b6e2a315a87206f05405b33b7792
-
SHA1
85d6d289441704aa27f71e64bb42553d30060e5e
-
SHA256
7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339
-
SHA512
0037caa47a39c216247d659f16591f203a2ceee5a114582690f45fc078337c0ca5163bc8f37110bd64bad92f5981b47a7f381553b34e8e78d20a58a1467f66e6
-
SSDEEP
24576:eyrL3EUN3miq7T9M1KpQjph6JRGDJ0p1KtYnF:trzEegBOIzn
Malware Config
Extracted
redline
gruha
77.91.124.55:19071
-
auth_value
2f4cf2e668a540e64775b27535cc6892
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
http://77.91.68.78/help/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Detect Mystic stealer payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4332-40-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4332-41-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4332-42-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic behavioral2/memory/4332-44-0x0000000000400000-0x0000000000428000-memory.dmp family_mystic -
Detects Healer an antivirus disabler dropper 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3232-35-0x0000000000400000-0x000000000040A000-memory.dmp healer -
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explonde.exeu3508149.exelegota.exet0866934.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation explonde.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation u3508149.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation legota.exe Key value queried \REGISTRY\USER\S-1-5-21-2890696111-2332180956-3312704074-1000\Control Panel\International\Geo\Nation t0866934.exe -
Executes dropped EXE 16 IoCs
Processes:
z7254360.exez2364847.exez1689186.exez0123006.exeq7093329.exer1224576.exes5076461.exet0866934.exeexplonde.exeu3508149.exelegota.exew4996016.exeexplonde.exelegota.exeexplonde.exelegota.exepid process 1240 z7254360.exe 4232 z2364847.exe 3416 z1689186.exe 5064 z0123006.exe 4800 q7093329.exe 868 r1224576.exe 1544 s5076461.exe 3448 t0866934.exe 2412 explonde.exe 1964 u3508149.exe 4936 legota.exe 2000 w4996016.exe 4652 explonde.exe 5000 legota.exe 1760 explonde.exe 5044 legota.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2488 rundll32.exe 3048 rundll32.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
z1689186.exez0123006.exe7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exez7254360.exez2364847.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1689186.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z0123006.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7254360.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2364847.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
q7093329.exer1224576.exes5076461.exedescription pid process target process PID 4800 set thread context of 3232 4800 q7093329.exe AppLaunch.exe PID 868 set thread context of 4332 868 r1224576.exe AppLaunch.exe PID 1544 set thread context of 4204 1544 s5076461.exe AppLaunch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3636 4800 WerFault.exe q7093329.exe 3504 868 WerFault.exe r1224576.exe 5008 4332 WerFault.exe AppLaunch.exe 5040 1544 WerFault.exe s5076461.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2232 schtasks.exe 3816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 3232 AppLaunch.exe 3232 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 3232 AppLaunch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exez7254360.exez2364847.exez1689186.exez0123006.exeq7093329.exer1224576.exes5076461.exet0866934.exeexplonde.exedescription pid process target process PID 2192 wrote to memory of 1240 2192 7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe z7254360.exe PID 2192 wrote to memory of 1240 2192 7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe z7254360.exe PID 2192 wrote to memory of 1240 2192 7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe z7254360.exe PID 1240 wrote to memory of 4232 1240 z7254360.exe z2364847.exe PID 1240 wrote to memory of 4232 1240 z7254360.exe z2364847.exe PID 1240 wrote to memory of 4232 1240 z7254360.exe z2364847.exe PID 4232 wrote to memory of 3416 4232 z2364847.exe z1689186.exe PID 4232 wrote to memory of 3416 4232 z2364847.exe z1689186.exe PID 4232 wrote to memory of 3416 4232 z2364847.exe z1689186.exe PID 3416 wrote to memory of 5064 3416 z1689186.exe z0123006.exe PID 3416 wrote to memory of 5064 3416 z1689186.exe z0123006.exe PID 3416 wrote to memory of 5064 3416 z1689186.exe z0123006.exe PID 5064 wrote to memory of 4800 5064 z0123006.exe q7093329.exe PID 5064 wrote to memory of 4800 5064 z0123006.exe q7093329.exe PID 5064 wrote to memory of 4800 5064 z0123006.exe q7093329.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 4800 wrote to memory of 3232 4800 q7093329.exe AppLaunch.exe PID 5064 wrote to memory of 868 5064 z0123006.exe r1224576.exe PID 5064 wrote to memory of 868 5064 z0123006.exe r1224576.exe PID 5064 wrote to memory of 868 5064 z0123006.exe r1224576.exe PID 868 wrote to memory of 1772 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 1772 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 1772 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 868 wrote to memory of 4332 868 r1224576.exe AppLaunch.exe PID 3416 wrote to memory of 1544 3416 z1689186.exe s5076461.exe PID 3416 wrote to memory of 1544 3416 z1689186.exe s5076461.exe PID 3416 wrote to memory of 1544 3416 z1689186.exe s5076461.exe PID 1544 wrote to memory of 4956 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4956 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4956 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 1544 wrote to memory of 4204 1544 s5076461.exe AppLaunch.exe PID 4232 wrote to memory of 3448 4232 z2364847.exe t0866934.exe PID 4232 wrote to memory of 3448 4232 z2364847.exe t0866934.exe PID 4232 wrote to memory of 3448 4232 z2364847.exe t0866934.exe PID 3448 wrote to memory of 2412 3448 t0866934.exe explonde.exe PID 3448 wrote to memory of 2412 3448 t0866934.exe explonde.exe PID 3448 wrote to memory of 2412 3448 t0866934.exe explonde.exe PID 1240 wrote to memory of 1964 1240 z7254360.exe u3508149.exe PID 1240 wrote to memory of 1964 1240 z7254360.exe u3508149.exe PID 1240 wrote to memory of 1964 1240 z7254360.exe u3508149.exe PID 2412 wrote to memory of 2232 2412 explonde.exe schtasks.exe PID 2412 wrote to memory of 2232 2412 explonde.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe"C:\Users\Admin\AppData\Local\Temp\7b421bfae7a01d240095e8981600eeb0cc4f1b44278fd88f3165366131997339_JC.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254360.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254360.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2364847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2364847.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1689186.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1689186.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0123006.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0123006.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7093329.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7093329.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1527⤵
- Program crash
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1224576.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1224576.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:1772
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:4332
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 5408⤵
- Program crash
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 868 -s 5847⤵
- Program crash
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5076461.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5076461.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4956
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 1526⤵
- Program crash
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0866934.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0866934.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F6⤵
- Creates scheduled task(s)
PID:2232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit6⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:4920
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"7⤵PID:4380
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E7⤵PID:4168
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1616
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"7⤵PID:3396
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E7⤵PID:1392
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main6⤵
- Loads dropped DLL
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3508149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3508149.exe3⤵
- Checks computer location settings
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
PID:4936 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN legota.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe" /F5⤵
- Creates scheduled task(s)
PID:3816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "legota.exe" /P "Admin:N"&&CACLS "legota.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb378487cf" /P "Admin:N"&&CACLS "..\cb378487cf" /P "Admin:R" /E&&Exit5⤵PID:4800
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4176
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:N"6⤵PID:4184
-
C:\Windows\SysWOW64\cacls.exeCACLS "legota.exe" /P "Admin:R" /E6⤵PID:808
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:5008
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:N"6⤵PID:4332
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\cb378487cf" /P "Admin:R" /E6⤵PID:4104
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main5⤵
- Loads dropped DLL
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4996016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4996016.exe2⤵
- Executes dropped EXE
PID:2000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4800 -ip 48001⤵PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 868 -ip 8681⤵PID:3740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4332 -ip 43321⤵PID:3900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1544 -ip 15441⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:4652
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5000
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeC:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe1⤵
- Executes dropped EXE
PID:1760
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeC:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exe1⤵
- Executes dropped EXE
PID:5044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4996016.exeFilesize
22KB
MD5fdb61efdc7064e9a26d99a4f6643f5f6
SHA1dc017a6c14778b91b42ed5a045e6dfae651f1e6d
SHA25692b27640d73df2ef2726713cdedc886d03148b24a9af9a20fd21ed4595a8a8f1
SHA5123c6f10f89e9a1d85d9cd21a231ce105aa094e99d1b2411639877f2b227d10ec05368e3c69499fdc77060e5dbd9c99ec26e4feff3356cf96ce5aed71ded140fa9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w4996016.exeFilesize
22KB
MD5fdb61efdc7064e9a26d99a4f6643f5f6
SHA1dc017a6c14778b91b42ed5a045e6dfae651f1e6d
SHA25692b27640d73df2ef2726713cdedc886d03148b24a9af9a20fd21ed4595a8a8f1
SHA5123c6f10f89e9a1d85d9cd21a231ce105aa094e99d1b2411639877f2b227d10ec05368e3c69499fdc77060e5dbd9c99ec26e4feff3356cf96ce5aed71ded140fa9
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254360.exeFilesize
964KB
MD55fe03346c8367ab70c668e76752e1a18
SHA1d93f48304713753c779c9ebd3b695fc12dd97a4a
SHA25651e03503a7d2090be13d580e684888ce3f4c37788572b7122802f7b4f38740ac
SHA5120db8e1f03b20ba4d529111de532f2943c46d0cb445aa341ea18f11b8d7f1993758268b4b5ed76e226130f79ed322b2a6199c142dd1b8ed05e74801b72af3f98e
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7254360.exeFilesize
964KB
MD55fe03346c8367ab70c668e76752e1a18
SHA1d93f48304713753c779c9ebd3b695fc12dd97a4a
SHA25651e03503a7d2090be13d580e684888ce3f4c37788572b7122802f7b4f38740ac
SHA5120db8e1f03b20ba4d529111de532f2943c46d0cb445aa341ea18f11b8d7f1993758268b4b5ed76e226130f79ed322b2a6199c142dd1b8ed05e74801b72af3f98e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3508149.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\u3508149.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2364847.exeFilesize
782KB
MD51da0c56d4666802da75e04c8e0470cb3
SHA18ceaa1c9569eb93d5652d0c14068562a2f09a7f2
SHA2566fb6ebff56ba5ca6fb1373b9a75091fbb22d54bafac99cde99fe90a1ad54ac3d
SHA5126507664d96d6d6b5ef40d108b723df6d4600760e4eded8dbacf781d2b7765a36e45bd8b7b10fde0c88e1c58ac520b3238e349bc25d22e7bb97867105b470eb4d
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2364847.exeFilesize
782KB
MD51da0c56d4666802da75e04c8e0470cb3
SHA18ceaa1c9569eb93d5652d0c14068562a2f09a7f2
SHA2566fb6ebff56ba5ca6fb1373b9a75091fbb22d54bafac99cde99fe90a1ad54ac3d
SHA5126507664d96d6d6b5ef40d108b723df6d4600760e4eded8dbacf781d2b7765a36e45bd8b7b10fde0c88e1c58ac520b3238e349bc25d22e7bb97867105b470eb4d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0866934.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\t0866934.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1689186.exeFilesize
599KB
MD5fcabaded152acb0b6ce060360d8f65fa
SHA19f4c86ece230e787fb69b988dab7da94275bdd95
SHA2567720a22944fb230574f397dd7b1daaf5fd7b0c32b8949cb67900ff88674de1bd
SHA512de1ad4ccd03b47fcd7cb1ed9c3b67233e94b3648a8d507a11a560e19ef5f676e58b2c3b4d87ff04048b59529d8a474c9c5ce13bca55adb33d3666825575636ea
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1689186.exeFilesize
599KB
MD5fcabaded152acb0b6ce060360d8f65fa
SHA19f4c86ece230e787fb69b988dab7da94275bdd95
SHA2567720a22944fb230574f397dd7b1daaf5fd7b0c32b8949cb67900ff88674de1bd
SHA512de1ad4ccd03b47fcd7cb1ed9c3b67233e94b3648a8d507a11a560e19ef5f676e58b2c3b4d87ff04048b59529d8a474c9c5ce13bca55adb33d3666825575636ea
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5076461.exeFilesize
380KB
MD5ecb2fab31140179231d75660a6773123
SHA18a38a23a285d684c7a96a106f8df2719a7006358
SHA256015643dc8a3b027cc19119cee2441a04cae0f09dbedf097ef21eb912cc5a7142
SHA512a52c948613e823c6fb05c69d599374844a5f5d9ca3e38a7f44bb351c7d57fe76f5a87cfec65364467b7c9e028722f07d9ebe9368af377ca904f089a75539eccc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s5076461.exeFilesize
380KB
MD5ecb2fab31140179231d75660a6773123
SHA18a38a23a285d684c7a96a106f8df2719a7006358
SHA256015643dc8a3b027cc19119cee2441a04cae0f09dbedf097ef21eb912cc5a7142
SHA512a52c948613e823c6fb05c69d599374844a5f5d9ca3e38a7f44bb351c7d57fe76f5a87cfec65364467b7c9e028722f07d9ebe9368af377ca904f089a75539eccc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0123006.exeFilesize
338KB
MD5ffa43e3f108740c8460eed3298cf270b
SHA13c0f9e40d5f183cd23ea63918363d2bd42034eff
SHA256b8e497930a9442e3d764b6d51a0bba230b1a49e8583fde46d57409c56330a2cc
SHA5123fb4adc344893184172ec22e0e5a6a4ef45ed1fbad7a148cb4270bc718fd01a4f377ff686b9b145a321a095b74dce323f0ebd60b3e68e1d6c453115c673b3a8b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z0123006.exeFilesize
338KB
MD5ffa43e3f108740c8460eed3298cf270b
SHA13c0f9e40d5f183cd23ea63918363d2bd42034eff
SHA256b8e497930a9442e3d764b6d51a0bba230b1a49e8583fde46d57409c56330a2cc
SHA5123fb4adc344893184172ec22e0e5a6a4ef45ed1fbad7a148cb4270bc718fd01a4f377ff686b9b145a321a095b74dce323f0ebd60b3e68e1d6c453115c673b3a8b
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7093329.exeFilesize
217KB
MD5500b3ec7dfa31b2a3556c3604242950c
SHA1c0bf86df7bf7affbdcc1be0ed5e5871e198b70f6
SHA256ceaee9838984542aee7c41ba85cf932cc3e66ab9c4a75abd7bca0f2cc16a7761
SHA512d8790ec4018510fee1b010ac78857b917dd70c69397c1e09478e913beb10df0c8e3935575b29ed393984922758ac7e9645e9f9f31695a71b5ed2f4e548a164fa
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7093329.exeFilesize
217KB
MD5500b3ec7dfa31b2a3556c3604242950c
SHA1c0bf86df7bf7affbdcc1be0ed5e5871e198b70f6
SHA256ceaee9838984542aee7c41ba85cf932cc3e66ab9c4a75abd7bca0f2cc16a7761
SHA512d8790ec4018510fee1b010ac78857b917dd70c69397c1e09478e913beb10df0c8e3935575b29ed393984922758ac7e9645e9f9f31695a71b5ed2f4e548a164fa
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1224576.exeFilesize
346KB
MD534f654cd0b74f77222a4ee076f29cbe3
SHA1d1670ac84eb5c68a48601b0aaa694a46c02ae2f2
SHA256c0b5765a850fde37079d0d5a8d1d7c2264bfd918a0c5824e1862f88040896154
SHA5127bc003241e831eb89009aa947eae01cc2a0de980d33cd8df7f9fa5ef0e514f2d38013ebea29df073223410856aa15f6f11413d0d1933c083159aedbf884521a3
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\r1224576.exeFilesize
346KB
MD534f654cd0b74f77222a4ee076f29cbe3
SHA1d1670ac84eb5c68a48601b0aaa694a46c02ae2f2
SHA256c0b5765a850fde37079d0d5a8d1d7c2264bfd918a0c5824e1862f88040896154
SHA5127bc003241e831eb89009aa947eae01cc2a0de980d33cd8df7f9fa5ef0e514f2d38013ebea29df073223410856aa15f6f11413d0d1933c083159aedbf884521a3
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\cb378487cf\legota.exeFilesize
219KB
MD5a427281ec99595c2a977a70e0009a30c
SHA1c937c5d14127921f068a081bb3e8f450c9966852
SHA25640ff20f391de89b6604882de34b20f32e78d6ead62c4587b3fa968c6c21e03d3
SHA5122a7a735bbaab2b19d5ca23e988ff7aaba8dc91b7e6295a84a4a9ff5efa5e89a67ff40073c671192054262153d188f0534bfd6e67231fe79c0e6e46d0ed380976
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exeFilesize
219KB
MD5c256a814d3f9d02d73029580dfe882b3
SHA1e11e9ea937183139753f3b0d5e71c8301d000896
SHA25653f129d7c6b008406a6214c261e45c06dfc1cd7dc36639018e37b07416bf5f7c
SHA5121f263232f9bcf8f936239cd0866594c5d14c4b6cca8337c1a20dabfedf588fbc5839deba7f5fc8243f1a6fa64f87a2133afde6ce7b6eb4293b4807f66e05df3a
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dllFilesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dllFilesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dllFilesize
89KB
MD5ec41f740797d2253dc1902e71941bbdb
SHA1407b75f07cb205fee94c4c6261641bd40c2c28e9
SHA25647425ebf3dd905bbfea15a7667662aa6ce3d2deba4b48dfbe646ce9d06f43520
SHA512e544348e86cee7572a6f12827368d5377d66194a006621d4414ef7e0f2050826d32967b4374dfbcdecda027011c95d2044bd7c461db23fad639f9922b92a6d33
-
C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\cred64.dllFilesize
273B
MD56d5040418450624fef735b49ec6bffe9
SHA15fff6a1a620a5c4522aead8dbd0a5a52570e8773
SHA256dbc5ab846d6c2b4a1d0f6da31adeaa6467e8c791708bf4a52ef43adbb6b6c0d3
SHA512bdf1d85e5f91c4994c5a68f7a1289435fd47069bc8f844d498d7dfd19b5609086e32700205d0fd7d1eb6c65bcc5fab5382de8b912f7ce9b6f7f09db43e49f0b0
-
memory/3232-87-0x0000000074900000-0x00000000750B0000-memory.dmpFilesize
7.7MB
-
memory/3232-50-0x0000000074900000-0x00000000750B0000-memory.dmpFilesize
7.7MB
-
memory/3232-36-0x0000000074900000-0x00000000750B0000-memory.dmpFilesize
7.7MB
-
memory/3232-35-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4204-58-0x0000000005CC0000-0x00000000062D8000-memory.dmpFilesize
6.1MB
-
memory/4204-75-0x00000000056F0000-0x000000000573C000-memory.dmpFilesize
304KB
-
memory/4204-88-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/4204-66-0x00000000056A0000-0x00000000056DC000-memory.dmpFilesize
240KB
-
memory/4204-61-0x0000000005630000-0x0000000005642000-memory.dmpFilesize
72KB
-
memory/4204-60-0x0000000005690000-0x00000000056A0000-memory.dmpFilesize
64KB
-
memory/4204-59-0x00000000057B0000-0x00000000058BA000-memory.dmpFilesize
1.0MB
-
memory/4204-52-0x0000000001570000-0x0000000001576000-memory.dmpFilesize
24KB
-
memory/4204-51-0x0000000074900000-0x00000000750B0000-memory.dmpFilesize
7.7MB
-
memory/4204-49-0x0000000074900000-0x00000000750B0000-memory.dmpFilesize
7.7MB
-
memory/4204-48-0x0000000000400000-0x0000000000430000-memory.dmpFilesize
192KB
-
memory/4332-44-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4332-42-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4332-41-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4332-40-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB