Analysis
-
max time kernel
132s -
max time network
146s -
platform
windows10_x64 -
resource
win10 -
submitted
19-06-2020 09:55
Static task
static1
Behavioral task
behavioral1
Sample
1e287a45c732a13d06d635e1989b8cb0.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
1e287a45c732a13d06d635e1989b8cb0.exe
Resource
win10
General
-
Target
1e287a45c732a13d06d635e1989b8cb0.exe
-
Size
1.5MB
-
MD5
1e287a45c732a13d06d635e1989b8cb0
-
SHA1
6787c99908639ee40c29aae2047ddae75fb51550
-
SHA256
8dd8593366530bd2c626de06da3b3833e6256a5b67558ae9da44312d2f48cec6
-
SHA512
42c01c15fac390356031e1afb47e99de2b53172e2ffc25012a0309921421d7f748962bff3946782ca1e04b408d10c1d2d659357ea8b07d5d8aa3779de7e38460
Malware Config
Extracted
C:\README1.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README1.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README2.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README3.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README4.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README5.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README6.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README7.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README8.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README9.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Admin\Desktop\README10.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README1.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README2.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README3.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README4.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README5.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README6.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README7.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README8.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README9.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\Users\Public\Desktop\README10.txt
pilotpilot088@gmail.com
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2296 2968 WerFault.exe 2064 1284 WerFault.exe explorer.exe -
js 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2728-0-0x0000000000400000-0x0000000000608000-memory.dmp js -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 3908 vssadmin.exe 3996 vssadmin.exe 3992 vssadmin.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
vssvc.exeWerFault.exeexplorer.exeWerFault.exedescription pid process Token: SeBackupPrivilege 2456 vssvc.exe Token: SeRestorePrivilege 2456 vssvc.exe Token: SeAuditPrivilege 2456 vssvc.exe Token: SeDebugPrivilege 2296 WerFault.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeCreatePagefilePrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeCreatePagefilePrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeCreatePagefilePrivilege 1284 explorer.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeCreatePagefilePrivilege 1284 explorer.exe Token: SeDebugPrivilege 2064 WerFault.exe Token: SeShutdownPrivilege 1284 explorer.exe Token: SeCreatePagefilePrivilege 1284 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
explorer.exepid process 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
Processes:
explorer.exepid process 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe 1284 explorer.exe -
Checks for installed software on the system 1 TTPs 31 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IEData\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2549743\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\WIC\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2467173\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB982573\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2544655\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key enumerated \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2524860\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2565063\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{4A03706F-666A-4037-7777-5F2748764D10}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall\OneDriveSetup.exe\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.KB2151757\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key queried \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Uninstall 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\IE40\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2\DisplayName 1e287a45c732a13d06d635e1989b8cb0.exe -
Adds Run entry to start application 2 TTPs 4 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 1e287a45c732a13d06d635e1989b8cb0.exe Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 1e287a45c732a13d06d635e1989b8cb0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 1e287a45c732a13d06d635e1989b8cb0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" 1e287a45c732a13d06d635e1989b8cb0.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\F964E154F964E154.bmp" 1e287a45c732a13d06d635e1989b8cb0.exe -
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.exeWerFault.exeWerFault.exepid process 2728 1e287a45c732a13d06d635e1989b8cb0.exe 2728 1e287a45c732a13d06d635e1989b8cb0.exe 2728 1e287a45c732a13d06d635e1989b8cb0.exe 2728 1e287a45c732a13d06d635e1989b8cb0.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe 2064 WerFault.exe -
UPX packed file 1 IoCs
Detects executables packed with UPX/modified UPX open source packer.
Processes:
resource yara_rule behavioral2/memory/2728-0-0x0000000000400000-0x0000000000608000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 9532 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\ie_60x42.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\204.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_11.8.204.0_neutral_split.scale-125_kzf8qxf38zg5c\SkypeApp\Assets\SkypeMedTile.scale-125_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-multiview.xml 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Content\Nexus.json 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\8201_32x32x32.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-30_altform-unplated.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\Images\Ratings\yelplogo.scale-200.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\contrast-black\OneConnectAppList.targetsize-24.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\ExchangeSmallTile.scale-100.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\OneNoteNotebookMedTile.scale-200.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-black\LargeTile.scale-125_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-white_targetsize-24_altform-unplated.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-64_altform-unplated.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-20.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\AlarmsLargeTile.scale-200.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\highfive.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubWideTile.scale-100_contrast-white.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.scale-100.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\bm_16x11.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ads_win10_300x250.scale-200.jpg 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-200_8wekyb3d8bbwe\Assets\contrast-white\WideLogo.scale-200_contrast-white.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\MedTile.scale-125.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailAppList.targetsize-30.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1702.312.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-white_scale-100.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\8201_32x32x32.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\Workflow\Density_Selected_Solid.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-spi-quicksearch.xml 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarLargeTile.scale-150.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\LinkedInboxSmallTile.scale-150.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\manifestAssets\Icon.targetsize-16.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\bg3_thumb.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\10910_48x48x32.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_x64__8wekyb3d8bbwe\_Resources\index.txt 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1612.10312.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-64_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxMailLargeTile.scale-200.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.targetsize-64_altform-unplated_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\LiveTile\5px.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\small\uy_16x11.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Autumn\autumn_1c.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Assets\Images\IncomingCallBrandingImage.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemeCreation\Apply.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Themes\Classic\mask\11h.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\pyramid\Golden_Pharaoh_.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\small\sweating.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Emoticons\large\drunk.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN111.XML 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_2017.203.236.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCalculator_10.1702.312.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\CalculatorLargeTile.scale-125.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN082.XML 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\keypadbase.xml 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\OutlookMailWideTile.scale-125.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-white\WideTile.scale-125.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.wink.small.scale-150.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.surprise.small.scale-150.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\contrast-black\MusicStoreLogo.scale-125_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarAppList.targetsize-30.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Generic-Light.scale-100.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\ThemePreview\Backgrounds\Background2.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.10252.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageAppList.scale-200_contrast-black.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\Weather_TileMediumSquare.scale-200.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\TextureBitmaps\wovenmat.jpg 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-125_8wekyb3d8bbwe\Assets\contrast-white\SmallLogo.scale-125_contrast-white.png 1e287a45c732a13d06d635e1989b8cb0.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt 1e287a45c732a13d06d635e1989b8cb0.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 22 whatismyipaddress.com -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
1e287a45c732a13d06d635e1989b8cb0.execmd.execmd.exedescription pid process target process PID 2728 wrote to memory of 3996 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 3996 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 3992 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 3992 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 3908 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 3908 2728 1e287a45c732a13d06d635e1989b8cb0.exe vssadmin.exe PID 2728 wrote to memory of 496 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 2728 wrote to memory of 496 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 2728 wrote to memory of 496 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 496 wrote to memory of 896 496 cmd.exe chcp.com PID 496 wrote to memory of 896 496 cmd.exe chcp.com PID 496 wrote to memory of 896 496 cmd.exe chcp.com PID 2728 wrote to memory of 3600 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 2728 wrote to memory of 3600 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 2728 wrote to memory of 3600 2728 1e287a45c732a13d06d635e1989b8cb0.exe cmd.exe PID 3600 wrote to memory of 2972 3600 cmd.exe chcp.com PID 3600 wrote to memory of 2972 3600 cmd.exe chcp.com PID 3600 wrote to memory of 2972 3600 cmd.exe chcp.com -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e287a45c732a13d06d635e1989b8cb0.exe"C:\Users\Admin\AppData\Local\Temp\1e287a45c732a13d06d635e1989b8cb0.exe"1⤵
- Checks for installed software on the system
- Adds Run entry to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chcp.comchcp3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2968 -s 30081⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Modifies Installed Components in the registry
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1284 -s 21802⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/496-416-0x0000000000000000-mapping.dmp
-
memory/896-417-0x0000000000000000-mapping.dmp
-
memory/2064-427-0x0000025050780000-0x0000025050781000-memory.dmpFilesize
4KB
-
memory/2064-424-0x000002504FA10000-0x000002504FA11000-memory.dmpFilesize
4KB
-
memory/2296-511-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-509-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-596-0x0000029AD9940000-0x0000029AD9941000-memory.dmpFilesize
4KB
-
memory/2296-595-0x0000029AE3EF0000-0x0000029AE3EF1000-memory.dmpFilesize
4KB
-
memory/2296-593-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-591-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-589-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-587-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-585-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-582-0x0000029AD9940000-0x0000029AD9941000-memory.dmpFilesize
4KB
-
memory/2296-581-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-579-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-577-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-575-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-572-0x0000029AD9940000-0x0000029AD9941000-memory.dmpFilesize
4KB
-
memory/2296-571-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-569-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-567-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-565-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-563-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-561-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-559-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-557-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-555-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-553-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-551-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-549-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-547-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-545-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-543-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-541-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-539-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-537-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-535-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-533-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-531-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-528-0x0000029AD9940000-0x0000029AD9941000-memory.dmpFilesize
4KB
-
memory/2296-527-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-525-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-523-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-521-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-519-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-517-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-515-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-513-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-435-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-507-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-505-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-503-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-501-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-499-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-497-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-429-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-495-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-493-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-491-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-489-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-431-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-487-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-485-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-483-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-481-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-479-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-477-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-475-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-473-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-471-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-469-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-467-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-465-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-463-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-461-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-428-0x0000029AD9540000-0x0000029AD9541000-memory.dmpFilesize
4KB
-
memory/2296-459-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-457-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-455-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-453-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-451-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-449-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-447-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-418-0x0000029AD7A00000-0x0000029AD7A01000-memory.dmpFilesize
4KB
-
memory/2296-419-0x0000029AD7A00000-0x0000029AD7A01000-memory.dmpFilesize
4KB
-
memory/2296-421-0x0000029AD8F70000-0x0000029AD8F71000-memory.dmpFilesize
4KB
-
memory/2296-422-0x0000029AD8F70000-0x0000029AD8F71000-memory.dmpFilesize
4KB
-
memory/2296-445-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-443-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-441-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-439-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-437-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2296-433-0x0000029AD6240000-0x0000029AD6241000-memory.dmpFilesize
4KB
-
memory/2728-204-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-316-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-238-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-391-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-2-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-3-0x0000000003D00000-0x0000000003D01000-memory.dmpFilesize
4KB
-
memory/2728-4-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-113-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-406-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-393-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-390-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-389-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-388-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-384-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-382-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-363-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-352-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-349-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-347-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-346-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-341-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-334-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-331-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-319-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-308-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-306-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-276-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-250-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-226-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-215-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-213-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-209-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-208-0x0000000003D00000-0x0000000003D01000-memory.dmpFilesize
4KB
-
memory/2728-207-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-205-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-0-0x0000000000400000-0x0000000000608000-memory.dmpFilesize
2.0MB
-
memory/2728-116-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-200-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-196-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-192-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-186-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-184-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-181-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-178-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-176-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-175-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-174-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-173-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-172-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-170-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-166-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-165-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-164-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-162-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-161-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-159-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-153-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-152-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-150-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-149-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-148-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-146-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-144-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-142-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-140-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-136-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-135-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-133-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-132-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-130-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-129-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-127-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-126-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-125-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-124-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-123-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-122-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-120-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2728-118-0x0000000003500000-0x0000000003501000-memory.dmpFilesize
4KB
-
memory/2972-598-0x0000000000000000-mapping.dmp
-
memory/3600-597-0x0000000000000000-mapping.dmp
-
memory/3908-415-0x0000000000000000-mapping.dmp
-
memory/3992-414-0x0000000000000000-mapping.dmp
-
memory/3996-413-0x0000000000000000-mapping.dmp